Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Microsoft Email Windows 10 Internet Backup Computer Hosted Solutions Software IT Services Workplace Tips Managed Service Provider Ransomware Smartphone Google Social Media Network Security Hardware User Tips IT Support Mobile Devices Business Continuity Android App Efficiency Communication Disaster Recovery Office Managed IT services Smartphones Upgrade Data Innovation Windows Miscellaneous Facebook Browser WiFi Microsoft Office Network Big Data Data Management Office 365 Password Remote Monitoring Gmail Internet of Things Spam Apps Phishing Holiday Hosted Solution Recovery Robot Avoiding Downtime Save Money Office Tips Work/Life Balance Customer Service Mobile Device Management Cloud Computing Server Word Hacker Firewall Unified Threat Management Content Filtering How To Apple Money SaaS Hacking Telephone Systems Employer-Employee Relationship Settings Risk Management Small Business Operating System Artificial Intelligence Computers Business Management Saving Money Productivity Remote Computing Presentation Business Growth Alert Customer Relationship Management Outsourced IT Education Data Backup Outlook Data storage Cybercrime Passwords Chrome Data Recovery Encryption Social Health communications Wi-Fi Windows 10 Marketing Paperless Office YouTube Automobile Mobile Computing Upgrades Tip of the week Budget Tech Support End of Support Competition LiFi Information Technology Cybersecurity Analytics Collaboration Legal IT Support Humor The Internet of Things File Sharing Twitter Managed IT Services Analyitcs IBM VoIP Politics Running Cable Monitors Vendor Management Google Drive Websites IT Management Bandwidth Going Green Bring Your Own Device Search Physical Security Sports Taxes Botnet IT service Printing Cortana Samsung Virtualization User Mobile Device Administration Computing IT solutions Safety Retail Wireless Technology Best Practice Computer Care Lithium-ion battery Wireless Business Owner Virtual Reality Website Downtime Training Error Google Maps Uninterrupted Power Supply Windows 8 Patch Management Domains PowerPoint BYOD Spyware Tracking Unified Communications 5G Entrepreneur Solid State Drive Consumers Web Server Application Update Vulnerability Public Speaking How To Document Management Users Two-factor Authentication Administrator 3D Printing Heating/Cooling VPN Mouse Hard Disk Drive Cameras Chromebook Law Enforcement Network Congestion Firefox Identity Theft eWaste IT Sevices Unsupported Software Servers Emoji Virtual Private Network Laptop CCTV Hard Drives Gadget Display Assessment Supercomputer Virtual Desktop Environment Hacks Help Desk Augmented Reality Mobile Data Server Management Mail Merge Halloween Refrigeration Consultation IT Budget Troubleshooting Current Events Licensing Deep Learning Fun Travel Statistics Processors Address Maintenance Scary Stories G Suite Phone System Automation Digital Payment Software Tips Motion Sickness Bluetooth Business Technology Google Docs Corporate Profile Specifications Undo IP Address Writing Quick Tips Alt Codes Personal Information Antivirus Lenovo WannaCry IT Consultant Mobile Office Machine Learning Social Engineering Time Management Cabling Typing Meetings Computer Repair Managed IT Notifications Superfish Storage Data loss Buisness Cleaning iPhone Relocation Network Management Tablet Google Wallet Infrastructure Cryptocurrency Knowledge Webcam Electronic Medical Records Crowdsourcing Dark Data VoIP Staffing Private Cloud Touchscreen BDR Drones Disaster Bitcoin Experience Point of Sale Shortcut Government Digital GPS

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...