About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.
Mobile? Grab this Article!
Security Tip of the Week Technology Productivity Business Computing Best Practices Network Security Cloud Data Privacy Data Backup IT Support Hosted Solutions IT Services Software Efficiency Internet Email Business Data Recovery Outsourced IT Malware Managed IT Services Computer Hackers Small Business Cybersecurity Innovation Cloud Computing Business Continuity Microsoft Hardware Collaboration User Tips Business Management Upgrade Google Backup Tech Term Mobile Devices Phishing Workplace Tips Windows 10 Managed Service Provider Communication Managed IT Services Managed Service Mobile Device Smartphone Paperless Office VoIP Disaster Recovery Quick Tips Office 365 Smartphones Ransomware Android Encryption Save Money Communications Server Saving Money Internet of Things Covid-19 Browser Business Technology Data Management Network Remote Monitoring Managed IT BDR Compliance Document Management Holiday Social Media Productivity Training Windows 7 Virtualization Remote Work Passwords Government Help Desk Wi-Fi Artificial Intelligence Healthcare Office Users WIndows File Sharing Microsoft Office Laptops Mobility Employer-Employee Relationship Data Security Automation BYOD Health Applications Miscellaneous Facebook Unified Threat Management Avoiding Downtime Infrastructure Scam IT Support Money Work/Life Balance Analytics Project Management Processor Apps Data loss Chrome Maintenance Windows 10 Bandwidth Information Files Tip of the week Company Culture IT Management Blockchain Meetings Machine Learning Vendor Management Antivirus Two-factor Authentication Redundancy Proactive Password Hosted Solution Vulnerability Big Data Customer Relationship Management OneDrive Recovery Employee-Employer Relationship Firewall Storage Website Router VPN Regulations Hard Drive Wireless IoT Access Control SaaS Virtual Private Network Word Politics Mobile Device Management Risk Management Gadgets Computing Downtime Software as a Service App RMM Tablet Internet Exlporer Network Management Managed Services Provider Management Information Technology Point of Sale Apple Smart Technology Mobile Computing Cybercrime Server Management Bring Your Own Device Digital Payment Remote Monitoring and Management Unified Communications Professional Services Assessment Networking Cooperation Chromebook Customer Service Travel Remote Workers Operating System Content Filtering Virtual Reality Uninterrupted Power Supply Data Breach The Internet of Things Private Cloud HIPAA Consultation Mobile Office Remote Worker VoIP Social Network Solid State Drive G Suite File Management Net Neutrality Electronic Health Records Monitoring Office tips Gmail Recycling Employees Utility Computing Payment Cards Automobile Managing Stress Time Management Consulting Remote Computing Augmented Reality Settings Patch Management Co-Managed IT Dark Web Search Managed Services Data Storage Mobile Security Flexibility How To 5G Cortana Modem Going Green Proactive IT Remote Working Fraud PowerPoint CCTV Operations Digital Optimization Technology Tips Cables Projects Biometric Data Warehousing Security Cameras Cost Management Monitors Hacking Mobile VoIP Multi-Factor Security Finance GPS IT Assessment Electronic Medical Records Computers Gadget Connectivity Vendor Printer CRM Hotspot Backup and Disaster Recovery Wireless Internet Disaster Touchscreen Batteries IT Consulting Budget E-Commerce Hacker Relocation Wearable Technology Enterprise Resource Planning Spyware Virtual Machines Mouse Tracking Wires Licensing Return on Investment Gamification Microsoft Excel Printing Robot Trending Cyber security Google Calendar Authentication Manufacturing Law Enforcement Vulnerabilities Digitize Distributed Denial of Service Tech Terms Websites Smart Devices Language Bookmarks Transportation Crowdsourcing Computer Care Migration Human Error Employer/Employee Relationships Cookies WPA3 Features Virtual Assistant Wireless Technology Mobile Credit Cards Comparison Administrator Spam Active Directory Video Games Processors Web Server Staff Cache Outlook Legislation Authorization Hard Disk Drives End of Support Chatbots Geography Google Maps Shadow IT Managed IT Service Theft Display Google Drive Motion Sickness Star Wars IBM Statistics Sensors SharePoint Favorites Staffing Permission Proactive Maintenance Nanotechnology Fleet Tracking Technology Laws Peripheral Wasting Time Error Education Tech Support Mail Merge Holidays Specifications Emoji Social Networking Regulation Windows Server Techology Outsource IT ROI Alert Botnet Cameras YouTube Shortcut Windows Server 2008 Solid State Drives Identity High-Speed Internet Firefox Lenovo Outsourcing Break Fix Financial Bitcoin Corporate Profile Bluetooth Downloads Conferencing Teamwork Black Friday Test Database Management How To Screen Reader Asset Tracking Hard Disk Drive Heating/Cooling Value of Managed Services Unified Threat Management PCI DSS Cyberattacks Database Data Storage IT Technicians IT Budget Address IT Identity Theft Motherboard MSP Cabling User Management Disaster Resistance Laptop Permissions Notes Social Samsung Physical Security eWaste Zero-Day Threat Options Development Current Events Superfish Video Conferencing Procurement Black Market Telephony Webcam WannaCry Telephone Instant Messaging Shared resources WiFi Business Telephone Cyber Monday GDPR IT Service Smart Tech OneNote Servers User Error Read Only Voice over Internet Protocol Telephone Systems Personal Information Mirgation Enterprise Content Management Sync Twitter Alerts Printers Scalability Virus History Cleaning Mobile Device Managment Legal Taxes Emergency USB PDF Hard Drives iPhone Notifications IT Consultant Software Tips Text Messaging Thank You Computing Infrastructure Students Advertising Hacks Supercomputer CrashOverride Congratulations Avoid Downtime Business Growth HaaS Public Cloud Update