crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Integrated Business Technologies can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Integrated Business Technologies has got you covered. To learn more about how we can help your business, reach out to us at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hosted Solutions Backup Hackers Email Mobile Devices Malware Software Business IT Support Small Business Hardware Network Data Server Smartphones Communication Upgrade Business Continuity VoIP Windows Mobile Device Management Efficiency Microsoft Office Disaster Recovery Google Virtualization Computer Miscellaneous Innovation Mobile Office Vendor Management Social Media Holiday Gadgets Outsourced IT User Tips Quick Tips Passwords Mobile Computing BYOD Android Smartphone Windows 10 Browser WiFi Network Security Data Backup The Internet of Things Internet of Things Remote Monitoring Managed IT services Bring Your Own Device Spam Ransomware Best Practice Trending Operating System Wireless Technology Apple Data Management Tech Term Remote Computing Alert Users Save Money Content Filtering Artificial Intelligence History Going Green Data Recovery Firewall Gmail App Analytics IT Solutions Customer Relationship Management Lithium-ion Battery Unified Threat Management IT Consultant Big Data Office Encryption Printer Tech Support Current Events Information Technology Managed IT Hard Drives Employer-Employee Relationship Facebook Windows 8 Antivirus Router Document Management Applications Humor Cloud Computing Saving Time Avoiding Downtime Paperless Office Maintenance Phone System Managed IT Services Outlook Health Website Customer Service Hacking Computers Marketing Excel Cybersecurity Collaboration Two-factor Authentication Compliance Digital Payment Mobile Device Automation VPN Office Tips Risk Management Retail Phishing Apps Application IT service Virus Chrome Business Growth Fax Server Co-Managed IT Administration Augmented Reality Office 365 Project Management Government Password Proactive IT Computer Repair Mouse Inbound Marketing Presentation Net Neutrality Social Data Security Budget Regulations PowerPoint Recovery Bandwidth Social Networking Money Tablet Running Cable Training Licensing Infrastructure iPhone Unified Communications User Error Wi-Fi End of Support Recycling Hiring/Firing LiFi Smart Technology Mobile Security Computing Data loss Redundancy Piracy Statistics Sports Competition Network Congestion Point of Sale eWaste Downtime Company Culture Twitter Scam Files Search Mobility Virtual Desktop USB IBM Business Owner Tip of the week Hacker File Sharing Wearable Technology User Programming Analyitcs Display HIPAA Alerts Education Flexibility Hosted Solution Safety Specifications Data storage Settings Cost Management Wireless Robot Intranet Cybercrime Save Time Help Desk Vulnerability Business Intelligence Internet Exlporer Productivity Printing Halloween Windows 8.1 Update Entrepreneur Storage SharePoint Virtual Private Network Virtual Reality Best Available Undo Connectivity PDF People Travel 5G Enterprise Content Management Scary Stories Monitors Migration Downloads SaaS Deep Learning IoT Distributed Denial of Service Bluetooth Hotspot BDR Google Wallet Assessment Writing Online Currency Adminstration Chatbots Multi-Factor Security Managed IT Service Domains 3D Star Wars Drones Language Computer Accessories Identity Theft Fun IT Management Social Engineering Word Buisness Identity Google Calendar Break Fix Business Technology Telephony Public Speaking Identities Utility Computing Backups Computing Infrastructure Cortana Network Management CIO Legislation Dark Web Networking Solid State Drive Healthcare Legal Environment Scheduling Cooperation Touchscreen Knowledge Windows 10 Motherboard Data Warehousing Samsung Machine Learning Alt Codes Hard Drive Troubleshooting Staff Debate Experience Heating/Cooling YouTube Modem Software as a Service Microsoft Excel Crowdfunding Techology Private Cloud Typing Cache Consumers Google Drive Operations Data Breach Software Tips Server Management How To Cookies Conferencing Technology Tips Blockchain Disaster Resistance Public Cloud IP Address Cryptocurrency Management Google Docs Technology Laws PC Care Refrigeration Nanotechnology Value Disaster Comparison Macro Permissions eBay IT Consulting Sync Bitcoin Enterprise Resource Planning IT Technicians Remote Support Unified Threat Management Leadership Patch Management Skype communications Screen Reader Streaming Media Digital Signature Black Friday New Additions Fraud Text Messaging Memory Mobile Device Managment Hacks Mobile Print Server Laptop Mirgation Work Station Access Control IT Support LinkedIn Gaming Console Smart Tech Cyber Monday Congratulations Law Firm IT Documents Video Surveillance Managing Stress

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code