Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 27 May 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Cloud Technology Hackers Best Practices Productivity Privacy Business Computing Business Malware Microsoft Email Windows 10 Internet Computer Workplace Tips Backup Hosted Solutions IT Services Managed Service Provider Hardware Smartphone Social Media Software App Efficiency Google Communication IT Support Mobile Devices Office Ransomware User Tips Network Security Disaster Recovery Android Upgrade Innovation Miscellaneous WiFi Business Continuity Smartphones Data Browser Microsoft Office Network Managed IT services Facebook Hosted Solution Spam Windows Holiday Gmail Big Data Apps Robot Recovery Work/Life Balance Office Tips Server Office 365 Hacker Apple Firewall Data Management Internet of Things How To Mobile Device Management Content Filtering Customer Service Password Operating System Small Business Social Business Management Saving Money Remote Computing Presentation Business Growth Passwords Artificial Intelligence Computers Alert Unified Threat Management Health Data storage Avoiding Downtime Education Hacking Cybercrime Save Money Money Phishing Wireless Technology Humor Encryption Upgrades Wireless Automobile Budget Website Analyitcs Remote Monitoring Downtime End of Support Wi-Fi VoIP Legal File Sharing LiFi Employer-Employee Relationship Customer Relationship Management Telephone Systems Outlook Twitter Settings Risk Management Politics User Cloud Computing The Internet of Things Chrome Physical Security Going Green Retail Cybersecurity Taxes IBM Running Cable Best Practice Botnet Printing Lithium-ion battery Word Business Owner Bandwidth Bring Your Own Device Computing Marketing Sports IT service Mobile Computing Cortana Virtualization Computer Care Administration Competition Tech Support Virtual Reality Training IT solutions Safety Information Technology Paperless Office SaaS Cabling BYOD Environment Tablet Web Server Bitcoin Update Experience Infrastructure communications 3D Printing Troubleshooting Staffing Administrator BDR Cameras Windows 8 Chromebook Mouse Domains Disaster Law Enforcement YouTube Network Congestion Collaboration Unified Communications Unsupported Software 5G Entrepreneur GPS Phone System Google Maps CCTV Emoji Application Users Display Public Speaking Uninterrupted Power Supply Specifications Gadget Mobile Data Two-factor Authentication Hacks Tracking Productivity Monitors Solid State Drive Travel Analytics Vendor Management Current Events Document Management Hard Drives G Suite Processors Laptop Google Drive Virtual Desktop Automation Hard Disk Drive Websites Motion Sickness Augmented Reality iPhone Identity Theft Refrigeration Halloween Google Docs Writing IT Support Deep Learning Personal Information Fun Supercomputer Help Desk IT Consultant Samsung Scary Stories Social Engineering Managed IT Services Machine Learning Meetings Computer Repair Search IT Budget Undo Licensing Cleaning Notifications Storage IP Address Maintenance PowerPoint Relocation Webcam Alt Codes Electronic Medical Records Google Wallet Digital Payment Software Tips Consumers Crowdsourcing Dark Data Mobile Office Corporate Profile Private Cloud Point of Sale Typing Drones Outsourced IT Data Backup Government Buisness eWaste Error IT Sevices Cryptocurrency Knowledge Mobile Device

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...