Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

$100 Million Hacking Incident Shows that No Compan...
Tip of the Week: 3 Best Practices to Organize Your...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Managed Service Provider Workplace Tips Productivity Business Computing Backup Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Google Efficiency Quick Tips Gadgets Smartphones Small Business Business Continuity Mobile Devices Disaster Recovery Computer User Tips Mobile Office Network Security Network Virtualization Server Microsoft Office VoIP Upgrade Social Media Windows 10 Miscellaneous Unified Threat Management Mobile Device Management Windows Ransomware Smartphone Android Operating System Passwords Remote Computing Innovation WiFi Vendor Management BYOD Communication Remote Monitoring The Internet of Things Holiday Mobile Computing Marketing Apps Managed IT services Facebook Users History Firewall Collaboration Analytics Apple Data Management IT Support Save Money IT Consultant Outsourced IT Alert Content Filtering Automation Bring Your Own Device Health Big data Managed IT Services Office Productivity Phishing Best Practice Spam Going Green BDR Tech Support Browser Wireless Technology Search communications Outlook Budget Lithium-ion Battery Hard Drives Virus App Artificial Intelligence Hiring/Firing Windows 8 Managed IT Information Technology Gmail IBM Printer Recovery Cybersecurity Employer-Employee Relationship Internet of Things Update Encryption Maintenance Help Desk Antivirus Phone System Data Backup Data storage Running Cable Humor Government Mobile Device Document Management It Management Legal Saving Time SaaS Bandwidth Customer Service Administration Travel Education Proactive IT Computers Save Time Law Enforcement Money Fax Server Business Intelligence Flexibility DDoS Hard Drive Computer Repair Word Avoiding Downtime Mobility Risk Management Password Cost Management Intranet Current Events Hacker Hosted Solution Windows 10 Tablet Digital Payment Two-factor Authentication Black Market Wireless Website Data Recovery Networking PowerPoint Social Networking Telephone Systems Training VPN Disaster Twitter Hacking Securty Office 365 iPhone User Solid State Drive Safety Lifestyle Social Network Congestion Public Cloud Laptop Google Docs Trending Cybercrime Office Tips Statistics Paperless Office Automobile Sports Cortana Scam Computing Pain Points Robot Downtime How To Excel Streaming Media Processors User Error Inbound Marketing IT service USB Presentation Company Culture Compliance Start Menu Virtual Desktop Taxes Gaming Console Chrome Software as a Service Programming Webcam Router Access Control Documents Uninterrupted Power Supply Computer Accessories Heating/Cooling Comparison Customer Relationship Management Business Growth Monitors Augmented Reality Telephony Patch Management Retail Google Maps YouTube Experience Text Messaging Settings Unified Communications Cloud Computing End of Support Hack Co-managed IT Project Management Politics Net Neutrality Machine Learning Emergency Chromebook Specifications Worker Distributed Denial of Service Harddrive Content Management Computer Care Messenger Google Drive Work/Life Balance Digital Signature Employer Employee Relationship Cryptocurrency External Harddrive Download Entertainment Licensing Electricity Botnet IT consulting Printing Video Surveillance Books Saving ZTime Cleaning LinkedIn Analytic CIO Smart Phones Get More Done Business Technology Microchip Reading WannaCry Regulations Computer Malfunction Windows XP Archive Printer Server Downloads Debate Public Speaking Time Management Society Micrsooft Point of Contact Hacks Relocation Entrepreneur Motion Sickness Google Calendar Touchscreen Thin CLient Identity Theft HIPAA Tracking Business Managemenet Knowledge Notifications Electronic Payment Reliable Computing Digital Web Server Upselling Webinar Technology Tips IP Address Websites Leadership Virtual Reality Workers Music Upgrades Human Resources Tech Terms Social Engineering Access Bluetooth LiFi Device Management Computing Infrastructure Samsung Skype Deep Learning G Suite Best Practives Rental Service Mobile Technology Spyware Memory Teamwork Physical Security Visible Light Communication online Currency Microserver Wi-Fi Storage Tablets Sync Data Security PDF Data Protection Mobile Payment Mouse Keyboard cache Flash Best Available CCTV Advertising Turn Key Domains Google Wallet Product Reviews GPS Displays Read In Internet of Things Trojan Data Loss eWaste Corporate Profile Shortcut Assessment Value Emails Organize Redundancy Banking Troubleshooting Drones Scalability 3D Staffing Data Breach Ebay File Sharing Environment VoIP Recycling Competition Consultation Language Meetings Permissions Business Metrics Business Owner Cabling Private Cloud Adminstration Writing Administrator switches Audit Pirating Information Application Supercomputer Productuvuty Vulnerability 3D Printing CrashOverride Television Capital

hp supplies medallionLarge2017