Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Telesys Voice and Data can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Telesys Voice and Data has got you covered. To learn more about how we can help your business, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Thursday, 22 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Windows 10 Internet Backup IT Services Hosted Solutions Software Network Security Managed Service Provider Android Computer Smartphone Ransomware Google Mobile Devices Workplace Tips User Tips IT Support Browser Communication Social Media Business Continuity Managed IT services Hardware Efficiency Smartphones Disaster Recovery Outsourced IT App Holiday Data Innovation Small Business Office Upgrade Miscellaneous WiFi Office 365 Microsoft Office Windows Data Management Facebook Business Management Remote Monitoring Server Network Gmail Big Data Internet of Things Data Backup Encryption Spam Cloud Computing Artificial Intelligence Firewall Password Robot Apps Phishing Data Recovery Hosted Solution Recovery Office Tips Tip of the week Chrome Employer-Employee Relationship Productivity Risk Management Cybersecurity Apple Avoiding Downtime Word Unified Threat Management Hacker Customer Service Mobile Device Management How To Content Filtering Save Money Money Paperless Office Work/Life Balance Wi-Fi Customer Relationship Management Outlook Windows 10 Passwords Telephone Systems Two-factor Authentication Document Management Settings Analytics Vendor Management Data Security Health The Internet of Things Applications Computers IT Support Alert Hacking Managed IT Services Data storage Tech Support Bandwidth Computing Education Operating System Cybercrime Antivirus Virtual Reality Saving Money Government VoIP Managed IT Remote Computing SaaS Presentation Business Growth Social communications Mouse YouTube User Collaboration Unified Communications Legal Scam Retail Vulnerability File Sharing LiFi Twitter Best Practice Politics Monitors Lithium-ion battery Travel Google Drive Business Owner Websites Automation Physical Security Augmented Reality Going Green Virtual Private Network Taxes Marketing IBM HIPAA Running Cable Server Management Botnet Printing Mobile Computing Samsung Mobile Security Competition Licensing Bring Your Own Device Search Maintenance IT Management Digital Payment Sports Information Technology IT service Cortana Computer Care Humor Virtualization Administration Project Management Training Mobile Device Analyitcs Safety IT solutions Business Technology Data loss BYOD Tablet Wireless Technology Wireless Automobile Infrastructure Upgrades Budget Downtime End of Support Specifications Website Shortcut Fort Worth Administrator Disaster 3D Printing Windows 8 Chromebook GPS Superfish Blockchain Cameras Digital business communications systems Staff Multi-Factor Security Law Enforcement Google Maps Network Congestion Domains 5G Entrepreneur Patch Management flu shot Uninterrupted Power Supply Unsupported Software Spyware Emoji Tracking Application Permissions CCTV Internet Protocol Flexibility Google Calendar Gadget Users Display Public Speaking iPhone Hacks Fort Worth IT Solid State Drive Mobile Data How To Networking Fraud VoIP streamlines Operations Heating/Cooling Legislation Current Events VPN DFW IT Service Hard Disk Drive G Suite Firefox Processors Identity Theft Laptop Hard Drives Net Neutrality business network infrastructure Wearable Technology Servers Virtual Desktop Smart Technology Motion Sickness Assessment Supercomputer Halloween Google Docs Refrigeration Techology Internet Exlporer data services PowerPoint Software as a Service Help Desk Writing Deep Learning Personal Information Fun Mail Merge Distributed Denial of Service IT Consultant Consultation IT Budget Scary Stories Consumers Disaster Resistance User Error IT Technicians Statistics Technology Tips Machine Learning Social Engineering Computer Repair Address Managed IT Service Meetings Cleaning Notifications Storage Undo Proactive IT Hotspot eWaste IP Address Mirgation Bluetooth Comparison Relocation Software Tips Alt Codes Electronic Medical Records Google Wallet Redundancy Break Fix IT Sevices Webcam Corporate Profile Quick Tips Printer Crowdsourcing Dark Data IT Consulting Language Environment Mobile Office Black Friday Private Cloud Typing Drones Dark Web Point of Sale WannaCry Time Management Access Control Buisness Data Breach Computing Infrastructure Troubleshooting Cyber Monday Error Cabling Cryptocurrency Knowledge Data Warehousing Network Management SharePoint Technology Laws Alerts Phone System flu season Bitcoin Update Staffing Experience Lenovo Microsoft Excel Web Server VoIP Touchscreen Downloads BDR Unified Threat Management Cooperation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code