Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Pulse Technology Solutions can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Pulse Technology Solutions has got you covered. To learn more about how we can help your business, reach out to us at 239-362-9902.

Charity Scams Are Very Real. Here’s How To Dodge T...
4 Tips That Can Help Your Business Better Manage I...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Hackers Backup Productivity IT Services Managed IT Services Software Ransomware Microsoft User Tips Outsourced IT Business Internet Email Business Continuity Windows 10 Mobile Devices Computer IT Support Google Productivity Smartphone Social Media Managed IT Efficiency Data Recovery Hardware Android Disaster Recovery Recovery Workplace Tips Data Backup Unified Threat Management Remote Monitoring Hosted Solutions Cybersecurity App Training Cloud Computing Data Tip of the week Save Money IT Support Work/Life Balance SaaS Managed IT Services Managed Service Provider Innovation Apps Office 365 Data Management Communication Robot Small Business Phishing Word Browser Content Filtering File Sharing Facebook Windows How To Risk Management Big Data Firewall Mobile Device Password Collaboration Telephone Systems Internet of Things IT Service Hosted Solution Paperless Office Smartphones Politics Uninterrupted Power Supply Health Computer Care Hacker Windows 10 VoIP Mobility BYOD Virtual Reality Money Automobile Mobile Device Management Files Wireless Twitter IT Management Encryption Data Storage Taxes Vendor Management Physical Security Virtualization VoIP Websites Alert Antivirus Virtual Private Network BDR Botnet Samsung Artificial Intelligence Going Green Education Help Desk Computers Address Chrome Meetings Google Maps Cleaning Emoji Private Cloud Touchscreen Scam Data loss Mobile Device Managment Crowdsourcing Telephony USB Redundancy Firefox Webcam Computing Public Cloud Electronic Medical Records Networking Search Government Sports Social Automation Unsupported Software Customer Relationship Management Point of Sale Staffing Solid State Drive Communications Notifications Data Security Microsoft Office YouTube Supercomputer Wireless Technology Assessment Web Server Hard Disk Drive Heating/Cooling Techology Outlook Settings IT Budget Black Market Consultation Cameras Licensing Servers Cortana Office Tips Shortcut Digital G Suite Digital Payment Software Tips Mobile Data CCTV Server Management WiFi Patch Management Spyware Legal Law Enforcement Update Tech Support Personal Information Remote Computing Quick Tips Project Management Statistics Maintenance Administrator GPS Gadget Vulnerability Employer-Employee Relationship Server IT Consultant History Chromebook Budget Processors Google Drive Bluetooth IBM Business Management Tracking Network IT Solutions Business Growth VPN Cybercrime Tablet Cabling Wi-Fi Avoiding Downtime Business Technology Corporate Profile Document Management Holiday Upgrades How To Travel Apple Infrastructure Computer Repair Time Management Lenovo Office Hacking Unified Threat Management WannaCry Downtime Virus Bandwidth Mail Merge Analytics Motion Sickness Customer Service Information Technology Disaster Error Upgrade Network Management Superfish Trending Monitors Sync Identity Theft Disaster Resistance Hacks Proactive IT IT Consulting Cost Management Emergency Data Breach CrashOverride Technology Laws Thank You Congratulations User Error

Newsletter Sign Up