Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Telesys Voice and Data can help. To learn more, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Business Computing Malware Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Software Computer IT Services Ransomware Network Security Managed Service Provider Android Smartphone Mobile Devices User Tips Managed IT services Google IT Support Workplace Tips Hardware Browser Communication Social Media Business Continuity Outsourced IT Efficiency Disaster Recovery Data Management App Smartphones Innovation Small Business Office Business Management Upgrade Cloud Computing Data Holiday Data Backup Facebook Remote Monitoring Miscellaneous WiFi Server Office 365 Microsoft Office Windows Gmail Big Data Internet of Things Encryption Spam Artificial Intelligence Network Firewall Password Robot Apps Phishing Hosted Solution Data Recovery Recovery Hacker Customer Service Mobile Device Management How To Content Filtering Saving Money Government Remote Computing Save Money Paperless Office Money Infrastructure Work/Life Balance Office Tips Chrome Tip of the week Passwords Employer-Employee Relationship Productivity Risk Management Cybersecurity Apple Avoiding Downtime Word Unified Threat Management Data storage Bandwidth Tech Support Computing IT Management Education Operating System Cybercrime Antivirus Virtual Reality Mobile Device VoIP Managed IT Presentation Business Growth Data loss SaaS BYOD Social Website Wi-Fi Tech Term Customer Relationship Management Outlook Windows 10 Telephone Systems Two-factor Authentication Document Management Settings Analytics Vendor Management Data Security Health The Internet of Things Applications IT Support Computers Alert Hacking Mobile Computing Managed IT Services Mobile Security Samsung Licensing Competition Maintenance Bring Your Own Device Search Sports Storage Digital Payment Information Technology IT service Cortana Humor Virtualization Computer Care Administration Project Management Analyitcs Training IT solutions Safety Business Technology Wireless Technology Tablet Automobile Upgrades Wireless Budget Downtime End of Support Specifications communications Mouse YouTube Collaboration Unified Communications User Scam Legal Vulnerability File Sharing LiFi Retail Twitter Monitors Best Practice Politics VPN Travel Lithium-ion battery Business Owner Identity Theft Google Drive Websites Automation Virtual Private Network Physical Security Augmented Reality Going Green Marketing Taxes Botnet IBM HIPAA Running Cable Server Management Printing Scary Stories Consumers Disaster Resistance IT Consultant Consultation IT Budget Machine Learning Social Engineering User Error IT Technicians Statistics Technology Tips Address Managed IT Service Meetings Computer Repair Modem Undo Proactive IT Hotspot Cleaning Notifications Relocation Software Tips eWaste IP Address Mirgation Bluetooth Comparison Redundancy Break Fix IT Sevices Webcam Corporate Profile Alt Codes Electronic Medical Records Google Wallet Cookies Dark Data IT Consulting Language Quick Tips Printer Crowdsourcing Private Cloud Environment Mobile Office Migration Black Friday Dark Web Point of Sale WannaCry Typing Drones Nanotechnology Buisness Data Breach Computing Infrastructure Time Management Access Control Error Cabling Troubleshooting Chatbots Cyber Monday Data Warehousing Cryptocurrency Knowledge Technology Laws Alerts Network Management SharePoint Identity Phone System flu season Lenovo Microsoft Excel Web Server VoIP Bitcoin Update Staffing Experience Unified Threat Management Cooperation Touchscreen Downloads BDR Administrator Disaster 3D Printing Shortcut Fort Worth Superfish Blockchain Cameras Digital Windows 8 Chromebook GPS Network Congestion Domains business communications systems Staff Multi-Factor Security Law Enforcement Google Maps Uninterrupted Power Supply Unsupported Software 5G Compliance Entrepreneur Patch Management flu shot Application Permissions CCTV Spyware Emoji Tracking Users Display Public Speaking Internet Protocol Flexibility Google Calendar Gadget Fort Worth IT Solid State Drive Mobile Data iPhone Hacks Regulations Networking Fraud How To VoIP streamlines Operations Heating/Cooling Legislation DFW IT Service Hard Disk Drive Current Events Social Networking Hard Drives Net Neutrality G Suite Firefox Processors Laptop Virtual Desktop business network infrastructure Wearable Technology Servers Smart Technology Motion Sickness Motherboard Halloween Google Docs Refrigeration Techology Internet Exlporer Assessment Supercomputer Help Desk Writing data services PowerPoint Software as a Service Mail Merge Distributed Denial of Service Deep Learning Personal Information Fun Router

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code