Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Telesys Voice and Data can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Telesys Voice and Data has got you covered. To learn more about how we can help your business, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Cloud Privacy Business Computing Productivity Malware Business Microsoft Email Windows 10 Internet Backup Hosted Solutions Computer IT Services User Tips Smartphone Software Workplace Tips Ransomware Network Security Google Managed Service Provider Android Hardware Browser IT Support Mobile Devices Social Media Business Continuity Managed IT services Efficiency Smartphones Communication Disaster Recovery App Office Remote Monitoring Data Management Facebook Miscellaneous WiFi Upgrade Microsoft Office Data Innovation Windows Outsourced IT Holiday Network Office 365 Small Business Big Data Firewall Internet of Things Data Backup Robot Apps Phishing Spam Hosted Solution Recovery Artificial Intelligence Password Gmail Business Management How To Content Filtering Save Money Money Data Recovery Work/Life Balance Office Tips Apple Tip of the week Employer-Employee Relationship Avoiding Downtime Server Productivity Cloud Computing Risk Management Customer Service Mobile Device Management Word Unified Threat Management Hacker Computing Saving Money Remote Computing Education Presentation Business Growth Cybercrime Government Customer Relationship Management SaaS Outlook Encryption Social Passwords Chrome Health Telephone Systems Settings Hacking Cybersecurity Computers IT Support Alert Managed IT Services Operating System Data storage Bring Your Own Device Search Maintenance IT Management Digital Payment Sports Analyitcs IT service VoIP Cortana Computer Care Virtualization Antivirus Administration Virtual Reality Training Mobile Device Specifications Safety Managed IT IT solutions Paperless Office Data loss BYOD Tablet Wireless Technology Wireless User Automobile Upgrades Budget Downtime End of Support Website Wi-Fi Retail communications Mouse Windows 10 Best Practice YouTube Lithium-ion battery Collaboration Legal Business Owner Two-factor Authentication File Sharing LiFi Twitter Marketing Applications Politics Monitors Travel Mobile Computing Analytics Vendor Management Google Drive Competition Tech Support Websites The Internet of Things Going Green Virtual Private Network Physical Security Taxes Running Cable Information Technology Botnet IBM Printing Samsung Humor Bandwidth Computer Repair Address Break Fix Meetings Cleaning Notifications Storage Undo IT Consulting IP Address Troubleshooting Bluetooth Black Friday Relocation Software Tips Alt Codes Electronic Medical Records Google Wallet Project Management Dark Web Webcam Corporate Profile Quick Tips Access Control Crowdsourcing Dark Data Data Breach Mobile Office Cyber Monday Phone System Private Cloud Typing Drones Business Technology Point of Sale WannaCry Time Management SharePoint Buisness Technology Laws flu season Error Cabling Cryptocurrency Knowledge Lenovo Network Management Downloads Unified Threat Management Fort Worth Infrastructure Bitcoin Update Staffing Experience Superfish Web Server VoIP Touchscreen Multi-Factor Security BDR business communications systems iPhone Shortcut flu shot Administrator Disaster 3D Printing Windows 8 Chromebook GPS Scam Cameras Digital Google Calendar Law Enforcement Google Maps Network Congestion Domains Internet Protocol 5G Entrepreneur Patch Management Fort Worth IT Uninterrupted Power Supply Unified Communications Unsupported Software Emoji Tracking Application Networking CCTV Spyware Legislation Gadget Users Display Public Speaking VoIP streamlines Hacks Vulnerability DFW IT Service Solid State Drive Mobile Data Document Management Data Security How To business network infrastructure Heating/Cooling PowerPoint Current Events VPN Smart Technology Hard Disk Drive Firefox Processors Identity Theft Laptop Hard Drives Techology Consumers G Suite data services Servers Software as a Service Virtual Desktop Automation Augmented Reality Distributed Denial of Service Motion Sickness Assessment Supercomputer Halloween Google Docs Refrigeration Disaster Resistance User Error eWaste Server Management Technology Tips Help Desk Writing Deep Learning Personal Information Fun Mail Merge Managed IT Service IT Sevices IT Consultant Consultation IT Budget Scary Stories Proactive IT Printer Environment Statistics Comparison Machine Learning Licensing Social Engineering

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...