Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 29 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Hackers Backup Business Computing Saving Money Hardware Data Business Malware Hosted Solutions IT Support IT Services Email Quick Tips Smartphones Gadgets Google Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Efficiency Virtualization Computer Microsoft Office Network Server Miscellaneous User Tips Upgrade Social Media Windows 10 VoIP Network Security Mobile Device Management Unified Threat Management Innovation Windows Smartphone Passwords BYOD Communication Operating System WiFi Marketing The Internet of Things Apps Remote Computing Mobile Computing Vendor Management Firewall Android Managed IT services History Holiday Users Ransomware Remote Monitoring Apple Facebook Alert Analytics IT Consultant Collaboration Data Management Content Filtering Automation Bring Your Own Device Save Money Office Health Hiring/Firing Best Practice Going Green Wireless Technology Big data Windows 8 Lithium-ion Battery Tech Support Hard Drives Outlook Phishing Information Technology Spam Gmail IBM Virus Browser Employer-Employee Relationship App Phone System Search Internet of Things Budget Printer Save Time Money Running Cable Data storage Maintenance BDR Saving Time Bandwidth Customer Service Humor Education Proactive IT Help Desk Computers Hacking Twitter Outsourced IT Managed IT Artificial Intelligence Office 365 iPhone User Solid State Drive Business Intelligence Flexibility Administration Legal Document Management Government Mobile Device Productivity Recovery Computer Repair Risk Management Intranet Hacker Hosted Solution Update communications Fax Server Two-factor Authentication Black Market Digital Payment Encryption Wireless Website Telephone Systems Travel Networking Training Avoiding Downtime PowerPoint Social Networking Current Events Antivirus Cybersecurity Excel User Error Politics End of Support Hard Drive Law Enforcement Managed IT Services Gaming Console Automobile Net Neutrality Safety Webcam Social DDoS Network Congestion Paperless Office Taxes Cybercrime Office Tips Word Computing Statistics Cortana Password Sports IT service Co-managed IT SaaS Cost Management Streaming Media Processors Downtime Robot USB Inbound Marketing Presentation Tablet Lifestyle Compliance Cloud Computing Company Culture Hack Chrome Virtual Desktop Router Documents Programming Computer Accessories Heating/Cooling Customer Relationship Management Business Growth Comparison Augmented Reality Retail Experience Text Messaging Pain Points Public Cloud VPN Troubleshooting Business Metrics Drones Disaster Webinar Staffing Ebay Environment IT Support 3D Upselling Computer Malfunction Permissions Recycling Competition Business Owner Chromebook Mobility Securty switches Pirating Information Messenger Adminstration Writing Work/Life Balance Motion Sickness Application Specifications Download Tracking Best Practives Content Management Books Windows 10 How To Digital Signature Web Server Microserver Cryptocurrency Entertainment Microchip Workers Google Docs Laptop IT consulting Video Surveillance Reading Start Menu Regulations Saving ZTime Turn Key Cleaning LinkedIn Trending Hacks Samsung Analytic Trojan CIO G Suite Organize Windows XP Archive Debate Relocation Uninterrupted Power Supply Identity Theft Physical Security Society Public Speaking Point of Contact Notifications Tablets Micrsooft Sync Entrepreneur Reliable Computing Data Protection Thin CLient HIPAA Virtual Reality CCTV Business Managemenet Electronic Payment Social Engineering Google Maps Bluetooth In Internet of Things Scalability Corporate Profile IP Address Leadership Computing Infrastructure Emails Music Human Resources Rental Service Harddrive Upgrades Memory LiFi Device Management Wi-Fi Meetings External Harddrive Skype Telephony Cabling Deep Learning Private Cloud Teamwork Flash Administrator Visible Light Communication online Currency Storage Supercomputer Smart Phones Get More Done Printer Server PDF Worker Monitors Machine Learning Best Available Settings Distributed Denial of Service Advertising Mouse Keyboard Domains Banking Employer Employee Relationship Product Reviews Google Wallet YouTube eWaste File Sharing Licensing GPS Read Displays Value Language Botnet Unified Communications Shortcut

hp supplies medallionLarge2017