crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Integrated Business Technologies can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Integrated Business Technologies has got you covered. To learn more about how we can help your business, reach out to us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Network Business Mobile Devices Hardware Malware Email Software Small Business Data Communication Smartphones Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Efficiency Disaster Recovery Google Computer Miscellaneous Mobile Office Vendor Management Gadgets Social Media Quick Tips Innovation WiFi Windows 10 Mobile Computing Holiday Best Practice Bring Your Own Device Smartphone Passwords BYOD User Tips Users Spam Remote Monitoring Wireless Technology Trending Operating System Apple Content Filtering Remote Computing Android History Alert Internet of Things Going Green The Internet of Things Firewall Unified Threat Management Browser Big Data Office IT Solutions Save Money Lithium-ion Battery Managed IT services Information Technology Current Events IT Consultant Network Security Ransomware Hard Drives App Customer Relationship Management Gmail Windows 8 Printer Tech Support Humor Analytics Data Management Facebook Saving Time Avoiding Downtime Phishing Maintenance Fax Server IT service Outlook Artificial Intelligence Health Managed IT Business Growth Data Backup Marketing Customer Service Excel Hacking Computers Outsourced IT Phone System Collaboration Apps Application Virus Office Tips Antivirus Retail Social Running Cable Digital Payment Co-Managed IT Mobile Device VPN PowerPoint Risk Management Employer-Employee Relationship Router Password Inbound Marketing iPhone Administration Presentation Budget Automation Proactive IT Training Computer Repair Recovery Analyitcs Money Education Help Desk Document Management Mobility User Error Safety Net Neutrality Licensing IBM Settings Hosted Solution Wireless Data storage Chrome File Sharing Save Time Cybercrime Social Networking Robot Hiring/Firing Printing Display End of Support Tablet LiFi Website Statistics Files Intranet Competition Business Intelligence Network Congestion Data Recovery Downtime Two-factor Authentication Augmented Reality Search USB Piracy Virtual Desktop Business Owner Encryption Sports Project Management Hacker Point of Sale Programming User Mouse Cybersecurity Networking IP Address Google Drive Company Culture Twitter How To Bandwidth Refrigeration Cryptocurrency Disaster Gaming Console Touchscreen Data Security Google Docs Specifications Flexibility Cost Management Bitcoin Digital Signature Software Tips Techology Memory Laptop communications Hacks Wearable Technology Disaster Resistance Wi-Fi Documents Conferencing Adminstration Halloween SaaS Entrepreneur Unified Communications Undo 3D Alerts PC Care Managed IT Services IT Consulting 5G PDF Value People eBay Scary Stories Telephony Computing Remote Support Leadership Data loss New Additions Data Breach Office 365 Monitors Skype Streaming Media Print Server Text Messaging Scam Deep Learning Domains Google Wallet Work Station Tip of the week Scheduling Congratulations Technology Laws Fun Writing LinkedIn Law Firm IT Video Surveillance Private Cloud Word Public Speaking Drones Windows 8.1 Update Recycling Unified Threat Management Cortana Social Engineering Best Available eWaste Buisness Public Cloud Identities Virtual Private Network Backups Knowledge Environment CIO Solid State Drive Bluetooth Sync Redundancy Legal Online Currency Samsung Experience Compliance Troubleshooting Debate Heating/Cooling Alt Codes Computer Accessories Mobile Device Managment Consumers Crowdfunding Macro Regulations YouTube Typing

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...