About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.
Mobile? Grab this Article!
Tip of the Week Security Technology Productivity Best Practices Data Business Computing Privacy IT Support Network Security Malware Internet Efficiency Tech Term IT Services Hosted Solutions Data Backup Managed IT Services Hackers Computer Email User Tips Software Business Cloud Microsoft Phishing Cloud Computing Innovation Mobile Devices Data Recovery Workplace Tips Windows 10 Ransomware Android Managed Service Hardware Outsourced IT Backup Upgrade Cybersecurity Business Management Communication Server Collaboration Smartphones Google Small Business Encryption Data Management Quick Tips Office 365 Smartphone Scam Network Browser Remote Monitoring Paperless Office VoIp Laptops Communications Business Technology Holiday Artificial Intelligence Government IT Management Miscellaneous Saving Money Managed Service Provider Blockchain Microsoft Office Disaster Recovery Passwords Healthcare Vulnerability Tip of the week Maintenance Avoiding Downtime BDR Virtualization Wi-Fi Antivirus Processor Facebook Automation Compliance Information BYOD Chrome Social Media Document Management OneDrive Employer-Employee Relationship Save Money Website Applications Machine Learning Infrastructure Business Continuity Windows Internet of Things Help Desk Users VPN Windows 7 Bandwidth Mobile Device Alert Managed IT Router Payment Cards Settings Financial Network Management Bring Your Own Device File Sharing Storage Virtual Private Network Managed Services Server Management HIPAA Management Networking Cooperation Access Control Word Company Culture Identity Theft Data Security RMM Information Technology Managing Stress Data loss Recycling Electronic Health Records Social Network Gadgets Password Employee-Employer Relationship Augmented Reality Tablet Dark Web How To Transportation Value of Managed Services App Remote Workers Servers Unified Threat Management 5G Mouse Wearable Technology Meetings Bookmarks Projects Wires Telephone Systems Operating System Options Multi-Factor Security IT Hard Drive Files Better Business Analytics Outlook Wasting Time Employees Memphis Samsung Permission MSP Optimization Star Wars E-Commerce Search Notes Vendor Management Modem Utility Computing Screen Reader Big Data User Error Social Wireless Internet Computing Video Conferencing Favorites Database Return on Investment Microsoft Excel Regulations Firewall Touchscreen Downtime knowb4 IT Assessment Cache Read Only Shortcut Chromebook Remote Monitoring and Management Google Maps Test Virtual Machines Cost Management Features PowerPoint Display Distributed Denial of Service Remote Computing Instant Messaging Customer Service Mail Merge Teamwork Vendor Permissions File Management Smart Tech Monitoring Politics Websites Security Cameras Employer/Employee Relationships Comparison Patch Management Voice over Internet Protocol Personal Information Spam Regulation Unified Threat Management Monitors Windows 10 Mobile Device Management avengers Google Calendar Staff Digitize Chatbots Vulnerabilities Zero-Day Threat Point of Sale VoIP Manufacturing Computing Infrastructure Credit Cards Assessment CrashOverride Professional Services Bitcoin Managed IT Service Finance Address Shared resources Fraud Cyber security Connectivity Statistics Private Cloud Database Management Specifications Tech Support Firefox Net Neutrality Going Green Social Networking Smart Devices Cookies OneNote Tech Terms endgame Gmail Shadow IT Break Fix Identity Development Lenovo Hard Disk Drives Downloads Alerts Computers Internet Exlporer Wireless Risk Management Valentine Current Events Enterprise Content Management Authentication WiFi The Internet of Things Consulting Bluetooth GDPR Black Friday IT Technicians Training Batteries Motherboard Sensors Nanotechnology YouTube Heating/Cooling Techology Theft think Legislation Outsourcing eWaste Office Cybercrime Cables Human Error Time Management Superfish Electronic Medical Records Solid State Drives Two-factor Authentication Licensing Holidays Twitter Malicious Unified Communications Authorization Travel Viruses Security Services Mobile Security Co-Managed IT IoT Managed Services Provider Virtual Reality Spyware Apps Cyber Monday Mirgation Apple Staffing Web Server How to Corporate Profile Education Budget Data storage Motion Sickness Tracking Google Drive Printer Hotspot G Suite Smart Technology Students Cameras Digital WannaCry Cabling Cleaning Covid-19 IT Support Language Customer Relationship Management Thank You Physical Security Gamification Printers SaaS Computer Care Health Content Filtering Managed IT Services SharePoint Money Taxes IT service Solid State Drive Congratulations CCTV Mobile Office Digital Payment Hosted Solution Disaster Remote Work Recovery IT Consultant Hard Disk Drive ROI Flexibility Uninterrupted Power Supply Proactive IBM Work/Life Balance Cyberattacks GPS Emergency Robot Remote Working