Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Haber Group can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Haber Group has got you covered. To learn more about how we can help your business, reach out to us at 866.625.3560.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Technology Malware Business Email Internet Hosted Solutions Microsoft Computer Business Computing Windows 10 Backup Small Business IT Services Software Ransomware Google User Tips Productivity Network Security Windows Hardware Smartphone Browser Data Management Android Data Business Continuity Phishing App Facebook Office 365 Upgrade Smartphones Saving Money Mobile Devices Gmail Artificial Intelligence Remote Monitoring Microsoft Office Big Data Internet of Things Cloud Computing Managed IT Services Word Data Recovery Efficiency Workplace Tips Tip of the week Office Tips Outsourced IT IT Support WiFi IT Support Money Disaster Recovery Spam Managed Service Provider Miscellaneous Social Media Cybersecurity Apple Settings Firewall Customer Service Content Filtering Productivity Robot Risk Management Server Innovation Government Employer-Employee Relationship Data storage Safety Outlook Virtual Private Network The Internet of Things Search Managed IT Services IT Management Administration Telephone Systems VoIP Maintenance Password IBM Mouse Wireless Data Backup Apps Customer Relationship Management Encryption Network Antivirus Hacking End of Support Hosted Solution Passwords Presentation Save Money Avoiding Downtime Hacker YouTube Two-factor Authentication communications Office Wireless Technology SaaS Recovery Printing Windows 10 Computing Unified Threat Management Google Drive Monitors Tablet LiFi Chrome Analytics Mobile Device Bandwidth Servers BDR Drones Comparison Training Title II Fun Undo Writing Social Automobile Techology Sports Education Server Management Application Google Maps Gadgets Specifications Humor Online Deep Learning Mail Merge Virtualization Retail Hacks Unified Threat Management Statistics Users Budget Black Friday sip Microsoft Excel Bring Your Own Device Address Social Engineering Business Management User Error Buisness Quick Tips IT solutions Bluetooth Cyber Monday telephony Best Practice Politics Corporate Profile Collaboration Printer VoIP User Smart Technology Wi-Fi Cortana Storage Business Growth Competition How To WannaCry Time Management Current Events File Sharing Access Control Downtime Distributed Denial of Service 5G Samsung Network Congestion Cabling Legal Dark Data Alt Codes Websites Business Technology Cybercrime Data loss Network Management Going Green SharePoint Virtual Reality Managed IT Service Managed IT Knowledge Computers Infrastructure Marketing Typing Lenovo Digital Touchscreen Downloads IP Address Operating System Break Fix Unified Communications Shortcut Experience Display Disaster Cryptocurrency Superfish Website Running Cable Spyware Virtual Desktop Multi-Factor Security Mobile Office Dark Web Patch Management Hard Drives Uninterrupted Power Supply Digital Payment Bitcoin Scam Laptop Information Technology Google Calendar Mobile Device Management Google Docs Net Neutrality BYOD Vulnerability Refrigeration Automation Solid State Drive Windows 8 Networking Public Speaking Halloween How To Heating/Cooling IT service Google Wallet Legislation Lithium-ion battery Computer Care FCC Augmented Reality VPN Communication Hard Disk Drive Data Security Scary Stories Vendor Management Firefox Black Market Point of Sale Law Enforcement Physical Security Twitter Paperless Office Staffing Gadget Administrator Personal Information Remote Computing Web Server GPS Holiday Computer Repair Processors Cameras Tracking Mobile Computing Health Alert CCTV Document Management Tech Support Emergency Electronic Medical Records Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update IT Consultant Relocation Domains Unsupported Software CrashOverride Chromebook Meetings Cleaning Private Cloud Mobile Data Emoji Webcam Work/Life Balance Error