About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.
Mobile? Grab this Article!
Security Tip of the Week Technology Best Practices Productivity Cloud Privacy Business Computing Data Backup Malware Software Hosted Solutions Outsourced IT Data IT Services Email Data Recovery Network Security Tech Term Hackers Business Managed IT Services Internet Cloud Computing Ransomware Business Management Computer Innovation Small Business IT Support Remote Monitoring Mobile Devices Efficiency Android Business Continuity IT Support Paperless Office Windows 10 User Tips Collaboration Google Backup Cybersecurity Encryption Managed IT Services Hardware Data Management Managed Service Provider VoIp Browser Server Upgrade Managed IT Communications Applications Office 365 Internet of Things Vulnerability Disaster Recovery Holiday Phishing Employer-Employee Relationship Smartphones Microsoft Artificial Intelligence Save Money Project Management Compliance Workplace Tips Passwords Unified Threat Management Tip of the week Infrastructure Healthcare Scam Windows Wi-Fi Managed Service BDR Bandwidth Document Management Information IT Management Business Technology BYOD Mobile Device Antivirus Saving Money Smartphone Government Word Firewall Data loss SaaS Risk Management Maintenance Social Media Router Tablet Two-factor Authentication Analytics Communication Telephone Systems Website Vendor Management Data Security Automation Chrome VPN Microsoft Office Quick Tips Customer Relationship Management Blockchain Big Data Bring Your Own Device HIPAA Net Neutrality Mobility Assessment Virtual Private Network Gmail Politics Smart Technology Machine Learning Internet Exlporer Remote Monitoring and Management Regulations How To Patch Management Remote Workers Training Company Culture VoIP Facebook Software as a Service Licensing Alert Mobile Security Unified Communications IT service Uninterrupted Power Supply Redundancy Network Management IoT Storage Network Help Desk Access Control Recovery Customer Service Management Mobile Device Management Server Management The Internet of Things Files Employees Remote Computing CrashOverride Conferencing Outlook SharePoint Language Nanotechnology Digital Payment OneNote Google Drive Theft Lenovo Cyber Monday Cache Enterprise Resource Planning YouTube Read Only Websites Hacking Technology Laws Mobile Computing Proactive Test Mouse Managed Services Provider Remote Worker Techology Data Warehousing Virtual Assistant Permissions Cabling Cables Firefox Zero-Day Threat Legislation App Utility Computing History Chromebook Instant Messaging Shortcut Downloads Computing Infrastructure Screen Reader Virtual Reality Employee-Employer Relationship Financial Superfish Tech Support Computer Care Data storage Mobile Settings Statistics Trending Unified Threat Management Meetings Solid State Drive Consultation RMM Emergency Computing Virtualization E-Commerce Disaster Resistance Private Cloud Wasting Time Fraud Identity Theft Wires Password Users Mail Merge Augmented Reality Distributed Denial of Service ROI Microsoft Excel Migration Vulnerabilities Finance Alerts Smart Tech Money IBM Avoiding Downtime Procurement IT Technicians Recycling Google Maps Digital Office Bluetooth User Error Modem Hard Disk Drive WPA3 Electronic Medical Records Samsung Comparison Features Heating/Cooling Proactive IT Database Spam Disaster Backup and Disaster Recovery Address Flexibility Cost Management Apple Networking Apps Managed IT Service Notes Chatbots Geography Authentication Multi-Factor Security G Suite Connectivity Wireless Corporate Profile Time Management Social Mirgation eWaste Managing Stress Spyware Bookmarks Search Printer Content Filtering Robot Fleet Tracking Operating System Specifications Electronic Health Records Servers IT Consulting Voice over Internet Protocol Social Networking Human Error File Sharing Operations Monitoring Security Cameras Downtime Break Fix Travel PowerPoint Identity Software Tips High-Speed Internet Authorization Google Calendar Cooperation WannaCry Enterprise Content Management Favorites Hotspot Cookies Asset Tracking Tech Terms Black Friday Cyberattacks Data Breach Windows 7 Point of Sale Motherboard MSP Permission Technology Tips Hosted Solution Wearable Technology Hard Drive Monitors Consulting Touchscreen Printing Dark Web Professional Services Development Staff Star Wars WiFi Cameras Cybercrime Cleaning Mobile Device Managment Education GPS Thank You Physical Security Printers Windows 10 Tracking Congratulations CCTV Webcam Supercomputer Public Cloud Error How To Gadgets Taxes Staffing IT Budget Hacker Regulation Twitter IT Consultant Web Server Automobile Administrator Sync Information Technology Work/Life Balance Motion Sickness Botnet
Newsletter Sign Up