Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Telesys Voice and Data can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Telesys Voice and Data has got you covered. To learn more about how we can help your business, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Friday, 22 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Software Backup Ransomware Computer IT Services Managed Service Provider Network Security Mobile Devices Android Smartphone User Tips Managed IT services Google IT Support Workplace Tips Social Media Hardware Browser Communication Outsourced IT Business Continuity Efficiency Disaster Recovery Smartphones App Innovation Data Management Upgrade Small Business Business Management Office Cloud Computing Data Holiday Data Backup Server Remote Monitoring Office 365 Windows Miscellaneous WiFi Facebook Microsoft Office Artificial Intelligence Gmail Spam Big Data Internet of Things Network Encryption Data Recovery Recovery Password Firewall Robot Apps Save Money Phishing Paperless Office Hosted Solution Work/Life Balance Mobile Device Management Customer Service Office Tips Tech Term Tip of the week Employer-Employee Relationship Productivity Saving Money Document Management Risk Management Remote Computing Cybersecurity Customer Relationship Management Word Unified Threat Management Managed IT Services Bandwidth Hacker Chrome Passwords How To Content Filtering Apple Government Avoiding Downtime Money Infrastructure Website Tech Support Wi-Fi Windows 10 Operating System Telephone Systems Two-factor Authentication Settings Compliance VoIP Business Growth Analytics Vendor Management Presentation Data Security The Internet of Things Computers IT Support Alert Applications Outlook Data storage Computing IT Management Education Cybercrime Antivirus Health Virtual Reality Mobile Device Managed IT Data loss SaaS Hacking BYOD Mobile Computing Social Budget BDR Downtime End of Support Competition communications Mouse YouTube Information Technology Patch Management Collaboration Unified Communications Legal Humor Scam Vulnerability File Sharing LiFi Analyitcs Twitter Politics Monitors VPN Travel Google Drive Identity Theft Regulations Websites Automation Virtual Private Network Physical Security Augmented Reality Going Green Specifications Taxes Assessment Botnet IBM Running Cable Server Management Printing Smart Technology Samsung Licensing User Maintenance Bring Your Own Device HIPAA Search Sports Storage Digital Payment Mobile Security Retail IT service Cortana Virtualization Best Practice Computer Care Administration Lithium-ion battery Business Owner Project Management Training IT solutions Safety Marketing Business Technology Wireless Technology Tablet Automobile Upgrades Wireless Cyber Monday Consumers Lenovo Web Server VoIP Bitcoin Update Staffing Chatbots Experience Utility Computing Data Warehousing Unified Threat Management Touchscreen Shortcut Administrator Disaster 3D Printing Alerts SharePoint flu season Superfish Cameras Digital Windows 8 Chromebook GPS Identity Law Enforcement Google Maps Healthcare Network Congestion Microsoft Excel eWaste Domains business communications systems Entrepreneur IT Sevices Uninterrupted Power Supply Unsupported Software Cooperation 5G Downloads Fort Worth Application CCTV Spyware Emoji Tracking Gadget Cost Management Users Display Blockchain Environment Public Speaking Internet Protocol Solid State Drive Mobile Data Staff Hacks Multi-Factor Security flu shot Networking How To Management Permissions Troubleshooting VoIP streamlines Heating/Cooling Hard Disk Drive Flexibility Current Events Google Calendar Laptop Fort Worth IT Hard Drives G Suite Firefox Processors Enterprise Resource Planning Virtual Desktop Fraud business network infrastructure Phone System Servers Motion Sickness Operations Legislation Halloween Google Docs DFW IT Service Refrigeration Techology Supercomputer Social Networking Help Desk Mobile Writing Net Neutrality data services Mail Merge Deep Learning Personal Information Wearable Technology Fun Scary Stories Disaster Resistance IT Consultant Consultation IT Budget Motherboard Machine Learning Social Engineering Internet Exlporer User Error Statistics Address Meetings Computer Repair Software as a Service Distributed Denial of Service Undo Proactive IT Cleaning Notifications Router Relocation Software Tips iPhone IP Address Bluetooth Redundancy Webcam Corporate Profile Alt Codes Electronic Medical Records IT Technicians Google Wallet Technology Tips Modem Dark Data Managed IT Service IT Consulting Quick Tips Crowdsourcing Private Cloud Hotspot Mobile Office Comparison Point of Sale WannaCry Typing Mirgation Drones Cookies Buisness Break Fix Data Breach Time Management Error Cabling Language Printer Black Friday Cryptocurrency Migration Knowledge Nanotechnology Dark Web Technology Laws PowerPoint Network Management Computing Infrastructure Access Control

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...