Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Telesys Voice and Data can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Telesys Voice and Data has got you covered. To learn more about how we can help your business, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Friday, 21 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Privacy Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Software Windows 10 Backup Computer IT Services Ransomware Network Security Managed Service Provider Mobile Devices Smartphone Android User Tips Managed IT services Hardware Google IT Support Outsourced IT Workplace Tips Social Media Browser Communication Disaster Recovery Efficiency Data Data Backup Innovation Business Continuity App Smartphones Data Management Small Business Office Business Management Cloud Computing Upgrade Holiday Internet of Things Facebook Remote Monitoring Miscellaneous WiFi Server Productivity Office 365 Microsoft Office Network Windows Data Recovery Phishing Encryption Spam Artificial Intelligence Gmail Big Data Tech Term Robot Apps Save Money Paperless Office Hosted Solution Recovery Unified Threat Management Bandwidth Firewall Password How To Content Filtering Saving Money Document Management Government Remote Computing Tip of the week Money Cybersecurity Work/Life Balance Wi-Fi Customer Relationship Management Office Tips Managed IT Services Chrome Passwords Employer-Employee Relationship Risk Management Apple Avoiding Downtime Word Hacker Mobile Device Management Infrastructure Customer Service Operating System Windows 10 Cybercrime Telephone Systems Virtual Reality Compliance VoIP Presentation Business Growth SaaS BYOD Social Data Security Website Applications Outlook IT Support File Sharing Two-factor Authentication Settings IT Management Analytics Vendor Management Health The Internet of Things Mobile Device Antivirus Computers Alert Hacking Mobile Computing Managed IT Data loss Data storage Tech Support BDR Computing Education Healthcare Humor Virtualization Computer Care Administration Patch Management Analyitcs Scam Training IT solutions Safety Vulnerability Regulations Wireless Technology Identity Theft Automobile Upgrades Wireless VPN Budget Downtime End of Support Specifications communications Virtual Private Network Smart Technology Mouse YouTube Assessment Licensing Collaboration Unified Communications User HIPAA Server Management Legal Router Mobile Security Digital Payment LiFi Retail Maintenance Twitter Monitors Best Practice Politics Travel Lithium-ion battery Business Owner Google Drive Automation Websites Physical Security Augmented Reality Going Green Marketing Project Management Taxes IBM Running Cable Tablet Botnet Printing Business Technology Samsung Competition Bring Your Own Device Search Sports Storage Information Technology IT service Cortana Dark Data Superfish Blockchain Digital Tracking Crowdsourcing Private Cloud Remote Monitoring and Management Environment business communications systems Mobile Office Staff Multi-Factor Security flu shot Uninterrupted Power Supply Point of Sale Typing Drones Buisness Cost Management Permissions Spyware Error WPA3 Troubleshooting Internet Protocol Flexibility Google Calendar Fort Worth IT Solid State Drive Cryptocurrency Knowledge Management Networking Fraud How To Fleet Tracking VoIP streamlines Operations Phone System Heating/Cooling Legislation DFW IT Service Hard Disk Drive Web Server Bitcoin Update Experience Social Networking Enterprise Resource Planning Net Neutrality Firefox Supercomputer Help Desk Administrator 3D Printing Asset Tracking business network infrastructure Wearable Technology Servers Cameras Windows 8 Chromebook Motherboard Network Congestion Mobile Techology Domains Internet Exlporer IT Budget Law Enforcement Unsupported Software Electronic Health Records data services 5G Entrepreneur Software as a Service Mail Merge Application Distributed Denial of Service CCTV Emoji Users Display Vulnerabilities Disaster Resistance Public Speaking Consultation Gadget Software Tips Mobile Data Cyberattacks iPhone Hacks IT Technicians Statistics Technology Tips Address Managed IT Service Modem Geography Proactive IT Hotspot User Error Current Events Mirgation Bluetooth Comparison Redundancy Hard Drives Break Fix Corporate Profile G Suite Processors Laptop Cookies Virtual Desktop Cables IT Consulting Language Quick Tips Printer History Motion Sickness Migration Black Friday Refrigeration Dark Web WannaCry Halloween Google Docs Nanotechnology Writing Wires Data Breach Computing Infrastructure PowerPoint Time Management Access Control Cabling Deep Learning Personal Information Fun Chatbots Cyber Monday Consumers Data Warehousing IT Consultant Staffing Scary Stories IoT Machine Learning Social Engineering MSP Technology Laws Alerts Network Management SharePoint Meetings Computer Repair Identity flu season Utility Computing Lenovo Undo Microsoft Excel VoIP Cleaning GPS Notifications Relocation Proactive eWaste Unified Threat Management IP Address Cooperation Touchscreen Downloads Google Maps Fort Worth IT Sevices Disaster Webcam Alt Codes Electronic Medical Records Google Wallet Shortcut

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code