Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Telesys Voice and Data can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Telesys Voice and Data has got you covered. To learn more about how we can help your business, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Hackers Best Practices Privacy Business Computing Productivity Malware Business Microsoft Email Windows 10 Internet Backup Computer Hosted Solutions Workplace Tips Ransomware Network Security Smartphone Software IT Services Managed Service Provider User Tips Google Mobile Devices Social Media Business Continuity Android Hardware IT Support Disaster Recovery App Efficiency Communication Office Managed IT services Microsoft Office Data Innovation Windows Facebook Miscellaneous Browser WiFi Smartphones Upgrade Network Big Data Remote Monitoring Data Management Holiday Office 365 Password Gmail Internet of Things Robot Apps Phishing Spam Hosted Solution Recovery Apple Avoiding Downtime Server Data Backup Customer Service Mobile Device Management Artificial Intelligence Word Unified Threat Management Small Business Hacker Firewall How To Content Filtering Cloud Computing Save Money Work/Life Balance Office Tips Health Employer-Employee Relationship Settings Productivity Outsourced IT Risk Management Hacking Computers Alert Data Recovery Data storage Operating System Business Management Saving Money Remote Computing Education Presentation Business Growth Tip of the week Telephone Systems Cybercrime Customer Relationship Management Money Outlook SaaS Encryption Social Cybersecurity Chrome Passwords Managed IT Services YouTube Best Practice Collaboration Lithium-ion battery Legal Business Owner IT Management File Sharing LiFi Marketing Twitter Politics Monitors Mobile Computing Antivirus Analytics Vendor Management Google Drive Websites Mobile Device Competition The Internet of Things Tech Support Physical Security Going Green Taxes Data loss Botnet IBM Information Technology Running Cable Printing Humor Samsung Bandwidth Bring Your Own Device Search Computing Sports Analyitcs Windows 10 VoIP IT service Cortana Virtualization Computer Care Administration Virtual Reality Training IT solutions Safety Paperless Office Wireless Technology Automobile Upgrades User Wireless Budget Virtual Private Network IT Support Downtime End of Support Website communications Wi-Fi Retail Consultation Law Enforcement IT Budget Network Congestion Domains Proactive IT Entrepreneur Statistics Licensing Unified Communications Unsupported Software 5G Application Address CCTV Maintenance Emoji Gadget Digital Payment Users Display Public Speaking IT Consulting Bluetooth Software Tips Mobile Data Two-factor Authentication Hacks Project Management Corporate Profile Quick Tips PowerPoint Data Breach Travel Current Events Laptop Consumers Hard Drives Business Technology G Suite WannaCry Processors Time Management Virtual Desktop Automation Technology Laws Managed IT Motion Sickness Cabling Augmented Reality Halloween Google Docs Refrigeration Lenovo Network Management Tablet Writing eWaste Unified Threat Management IT Sevices Infrastructure Deep Learning Personal Information Fun Staffing Scary Stories Superfish IT Consultant VoIP Touchscreen Machine Learning BDR Social Engineering Environment business communications systems Shortcut Meetings Disaster Computer Repair GPS Storage Undo Scam Cleaning Digital Notifications Relocation Google Maps Troubleshooting IP Address Internet Protocol Patch Management Webcam Uninterrupted Power Supply Alt Codes Electronic Medical Records Google Wallet Tracking Dark Data Networking Spyware Crowdsourcing Private Cloud Mobile Office Phone System VoIP streamlines Vulnerability Point of Sale Solid State Drive Typing Drones Government Document Management Buisness Specifications Data Security How To business network infrastructure Heating/Cooling Error Knowledge VPN Hard Disk Drive Cryptocurrency Firefox BYOD Identity Theft Techology data services Servers Experience Web Server Bitcoin Update Assessment Supercomputer Disaster Resistance Server Management Administrator Help Desk 3D Printing iPhone Mouse Mail Merge Cameras Windows 8 Chromebook

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...