crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

Two unnamed companies had the misfortune of discovering this after researchers found malware on 40 different company-owned devices. To make matters worse, Check Point, the firm that discovered this malware, believes that the malware was installed on the device before it had even left the factory. To resolve these troubles, the devices required a full reinstall of the operating system to ensure that the malware was removed, the reason being that the malware was installed through system privileges.

The following devices were infected:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices had malware preinstalled on them at an alarming variety. Most of these were simply adware that displayed annoying ads, or malware designed to steal information. Some examples are the Loki malware and the Slocker ransomware--a concerning pair to be found on any device.

These instances certainly aren’t unique, or the first examples of such a malware installation, but it might be just enough to force you to reevaluate your organization's vetting process. Always have your IT department check out devices before they are put to use; particularly used devices that you may have picked up at a discount.

If this proves anything at all, it’s that you can’t always trust manufacturers, and that you can never be too diligent when it comes to network security. As such, you should take the necessary precautions to make sure your infrastructure isn’t vulnerable from within thanks to preexisting conditions. If your organization needs help protecting its data, Integrated Business Technologies can help. To learn more, reach out to us at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Network Mobile Devices Hardware Business Malware Email Software Small Business Data Smartphones Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Efficiency Disaster Recovery Google Miscellaneous Computer Mobile Office Vendor Management Gadgets Social Media Quick Tips Innovation Mobile Computing Holiday WiFi Windows 10 User Tips Best Practice Passwords Bring Your Own Device BYOD Smartphone Users Trending Operating System Apple Remote Monitoring Wireless Technology Spam The Internet of Things Content Filtering Remote Computing Browser Android History Going Green Alert Internet of Things Firewall Data Management IT Solutions Lithium-ion Battery Save Money Managed IT services IT Consultant Network Security Unified Threat Management Information Technology Current Events Big Data Office Facebook Hard Drives App Customer Relationship Management Ransomware Windows 8 Gmail Printer Tech Support Humor Saving Time Avoiding Downtime Analytics Collaboration Maintenance Fax Server Outlook Health Office Tips Antivirus Retail Phishing Marketing IT service Excel Artificial Intelligence Managed IT Business Growth Data Backup Customer Service Hacking Computers Apps Application Outsourced IT Virus Phone System Administration Presentation User Error Budget Co-Managed IT Automation Computer Repair Proactive IT Recovery Social Running Cable Digital Payment Mobile Device Router Inbound Marketing VPN PowerPoint Risk Management Employer-Employee Relationship Password iPhone Training Two-factor Authentication Help Desk Augmented Reality Search Virtual Desktop USB Piracy Business Owner Encryption Sports Project Management Hacker Point of Sale Programming User Mouse Cybersecurity Analyitcs Money Education Document Management Mobility Safety Net Neutrality Licensing IBM Settings Hosted Solution Wireless Data storage Chrome File Sharing Save Time Cybercrime Social Networking Robot Hiring/Firing Printing Display End of Support Tablet LiFi Website Statistics Files Tip of the week Intranet Competition Business Intelligence Network Congestion Data Recovery Downtime Identities Public Cloud Virtual Private Network Backups Gaming Console Knowledge Environment CIO Solid State Drive Bluetooth Sync Redundancy Legal Online Currency Samsung Debate Experience Compliance Troubleshooting Heating/Cooling Alt Codes Computer Accessories Mobile Device Managment Consumers Crowdfunding Regulations YouTube Typing Networking Adminstration IP Address Google Drive Company Culture Twitter 3D How To Bandwidth Refrigeration Cryptocurrency Disaster Touchscreen Data Security Google Docs Specifications Flexibility Cost Management Bitcoin Digital Signature Software Tips Techology Scam Memory Laptop communications Scheduling Hacks Wearable Technology Disaster Resistance Wi-Fi Documents Conferencing Halloween SaaS Entrepreneur Unified Communications Undo Alerts PC Care Managed IT Services IT Consulting 5G PDF Value People eBay Scary Stories Telephony Data loss Computing Remote Support Leadership New Additions Data Breach Office 365 Monitors Skype Streaming Media Deep Learning Print Server Text Messaging Domains Google Wallet Work Station Congratulations Technology Laws Fun Writing LinkedIn Word Law Firm IT Video Surveillance Private Cloud Macro Public Speaking Drones Windows 8.1 Update Recycling Unified Threat Management Cortana Social Engineering Best Available eWaste Buisness

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code