About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.
Mobile? Grab this Article!
Security Tip of the Week Technology Best Practices Productivity Cloud Data Backup Privacy Malware Outsourced IT Business Computing Software Tech Term Network Security Hosted Solutions Email Data IT Services Managed IT Services Data Recovery Hackers Business Internet Ransomware Cloud Computing Computer Mobile Devices Small Business Remote Monitoring IT Support IT Support Innovation Business Continuity Business Management Backup Android Managed IT Services Hardware Windows 10 Paperless Office Data Management Google Collaboration Managed Service Provider User Tips Cybersecurity Efficiency Encryption Browser Server Managed IT Applications Internet of Things Vulnerability Holiday VoIp Disaster Recovery Smartphones Employer-Employee Relationship Microsoft Artificial Intelligence Project Management Mobile Device Save Money Communications Smartphone Infrastructure Passwords Scam Unified Threat Management Tip of the week Office 365 Healthcare Wi-Fi IT Management BYOD Bandwidth BDR Antivirus Government Word Blockchain Firewall Data loss Maintenance Managed Service Workplace Tips Compliance Information Upgrade Social Media Two-factor Authentication SaaS Router Windows Communication Data Security Chrome Website Phishing Quick Tips Document Management Customer Relationship Management Telephone Systems Saving Money Remote Monitoring and Management The Internet of Things Virtual Private Network Assessment Network Help Desk Customer Service Smart Technology Remote Workers HIPAA Company Culture Risk Management Big Data Gmail Mobility Patch Management Internet Exlporer Machine Learning How To Politics Regulations Facebook VoIP Tablet Business Technology Alert Analytics Redundancy Employees Uninterrupted Power Supply Vendor Management Training VPN Mobile Security Network Management Microsoft Office Access Control Bring Your Own Device Files Licensing Unified Communications IoT Recovery Mobile Device Management Server Management IT service Storage Motherboard Mouse RMM Google Drive Software Tips Wearable Technology Hard Drive Hacking Technology Laws Mobile CrashOverride Legislation Wires Users Staff Star Wars Techology Data Warehousing E-Commerce YouTube Websites Vulnerabilities Finance Cabling Firefox Language Nanotechnology Superfish Procurement Point of Sale ROI Remote Computing Shortcut Downloads Net Neutrality Mobile Computing Emergency App Computing WPA3 Electronic Medical Records Cache Trending Unified Threat Management Office History Mail Merge Backup and Disaster Recovery Solid State Drive Consultation Utility Computing Disaster Resistance Features Settings Statistics Digital Payment Permissions Geography Authentication Password Computing Infrastructure Screen Reader Distributed Denial of Service Social Virtualization Meetings Samsung Comparison Fleet Tracking Operating System IBM Avoiding Downtime Tech Support Private Cloud User Error Managing Stress Bookmarks Address Software as a Service Human Error Hard Disk Drive Augmented Reality Proactive IT Electronic Health Records Digital Bluetooth Virtual Reality Fraud High-Speed Internet Authorization Disaster Computer Care Data storage Alerts Smart Tech Networking Managed IT Service Monitoring Security Cameras Heating/Cooling Microsoft Excel Migration Multi-Factor Security Modem Specifications Asset Tracking Tech Terms Corporate Profile Time Management Identity Theft IT Technicians Recycling Search Printer Enterprise Content Management Favorites G Suite MSP Permission Robot Flexibility Cost Management IT Consulting Management Cyberattacks Spyware Money Spam Development Google Maps Connectivity Break Fix Consulting Printing Servers Chatbots Content Filtering Google Calendar Apple File Sharing Black Friday OneNote Theft WannaCry Mirgation eWaste Conferencing Technology Tips Proactive Test Operations Downtime Data Breach Travel Enterprise Resource Planning Read Only Wireless Social Networking Cables Zero-Day Threat Cooperation Dark Web Managed Services Provider Remote Worker Automation Identity Instant Messaging Hotspot Cookies Lenovo Hosted Solution Cyber Monday Employee-Employer Relationship Financial Monitors Touchscreen Outlook SharePoint Chromebook Botnet Work/Life Balance Motion Sickness Printers IT Consultant Cybercrime Web Server Automobile Information Technology Mobile Device Managment Thank You WiFi Cameras Cleaning Notes Education Windows 10 Congratulations Regulation GPS Physical Security Webcam How To Public Cloud Error Gadgets Tracking Apps CCTV Supercomputer Twitter Taxes Staffing Administrator IT Budget Hacker Sync
Newsletter Sign Up