Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Haber Group can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Haber Group has got you covered. To learn more about how we can help your business, reach out to us at 866.625.3560.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 October 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Email Malware Technology Business Hosted Solutions Computer Internet Microsoft Windows 10 Business Computing Backup Software Ransomware Network Security User Tips Productivity Windows Google Hardware Smartphone IT Services Data Management Data App Phishing Android Facebook Upgrade Saving Money Business Continuity Mobile Devices Gmail Small Business Browser Microsoft Office Big Data Tip of the week Word Efficiency Office Tips Cloud Computing IT Support Smartphones Workplace Tips Internet of Things Apple Settings Spam Miscellaneous Content Filtering Social Media Robot Managed IT Services Remote Monitoring Customer Service Innovation Office 365 Server Data storage Cybersecurity Artificial Intelligence Data Recovery Disaster Recovery Managed Service Provider WiFi The Internet of Things Windows 10 Encryption Network Hosted Solution IBM Wireless YouTube Apps communications Customer Relationship Management Printing Risk Management Hacking IT Support Firewall Virtual Private Network End of Support Passwords Managed IT Services Presentation Google Drive Productivity IT Management Hacker Avoiding Downtime Save Money Telephone Systems Office Wireless Technology LiFi Recovery Chrome SaaS Analytics Antivirus Unified Threat Management Outlook Monitors Search Money Employer-Employee Relationship Outsourced IT Administration VoIP Password Safety Mobile Device Best Practice Spyware telephony Superfish Training Application Writing Gadgets Cortana Patch Management Automobile Uninterrupted Power Supply Virtualization Business Growth Storage Scam Current Events Downtime Tablet Retail Users Legal Vulnerability Solid State Drive Networking Alt Codes How To Cybercrime Dark Data Going Green Heating/Cooling IT service Social Engineering Hard Disk Drive Knowledge VPN Data Security Typing Firefox User Servers Wi-Fi Politics BDR Collaboration Competition Experience Operating System Unified Communications Techology Cryptocurrency Running Cable How To Computing Server Management 5G Virtual Desktop Google Maps File Sharing Mail Merge Unified Threat Management Bitcoin Laptop Samsung Network Congestion Marketing Information Technology Statistics Two-factor Authentication Websites Maintenance Virtual Reality Google Docs Address User Error Windows 8 Quick Tips IP Address Halloween Computers Google Wallet Bluetooth Corporate Profile Website Data Backup VoIP Mobile Office Scary Stories Display Drones Bandwidth Hard Drives WannaCry Social Time Management Mobile Device Management Sports Digital Payment Education Cabling Refrigeration Deep Learning Data loss Public Speaking Humor Business Technology Hacks Network Management Lithium-ion battery Automation Budget Managed IT Augmented Reality Infrastructure Bring Your Own Device Digital sip Lenovo Computer Care Touchscreen Buisness Communication Vendor Management Mouse Shortcut Fun IT solutions Disaster Undo Point of Sale Black Market Mobile Computing Law Enforcement Physical Security Paperless Office CrashOverride Twitter Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Holiday Computer Repair Business Management Cameras Processors Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Identity Theft Travel G Suite Notifications Upgrades Supercomputer Botnet Motion Sickness Printer Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Domains Update Emergency Access Control IT Consultant Government Unsupported Software Relocation Meetings Chromebook Cleaning BYOD Mobile Data Private Cloud Webcam Emoji Work/Life Balance Error