Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Email IT Support Hosted Solutions IT Services Quick Tips Google Smartphones Gadgets Efficiency Mobile Devices Small Business Mobile Office Disaster Recovery Virtualization Business Continuity Network Computer Microsoft Office User Tips Server Network Security Miscellaneous Upgrade Social Media Windows 10 VoIP Unified Threat Management Mobile Device Management Windows Innovation WiFi Smartphone Passwords Operating System Remote Computing BYOD Communication Vendor Management The Internet of Things Marketing Mobile Computing Apps Ransomware Firewall History Holiday Managed IT services Facebook Users Android Remote Monitoring Analytics Apple Collaboration Alert Data Management Save Money IT Consultant Health Content Filtering Bring Your Own Device Automation Office Big data Best Practice Spam Going Green Outsourced IT Phishing Hiring/Firing Wireless Technology App Lithium-ion Battery Hard Drives Windows 8 Tech Support Information Technology BDR IBM Outlook Search Gmail Virus Browser Employer-Employee Relationship Productivity Phone System Internet of Things Budget Printer Save Time Money Saving Time Managed IT Services Running Cable Data storage Administration Maintenance Proactive IT Help Desk Bandwidth Computers Customer Service Humor Encryption Education Business Intelligence Hacking Current Events Mobile Device Document Management IT Support Hard Drive Office 365 Computer Repair Managed IT User Solid State Drive Intranet Flexibility Government Legal Recovery Update Risk Management Password Digital Payment Hacker SaaS Hosted Solution communications Tablet PowerPoint Social Networking Fax Server Antivirus Two-factor Authentication Wireless Twitter Black Market Artificial Intelligence Travel Website Telephone Systems Avoiding Downtime Training iPhone Networking Experience Settings Pain Points Public Cloud YouTube User Error Excel Cybersecurity Politics End of Support Law Enforcement Gaming Console Statistics Automobile Safety Social Webcam Network Congestion How To DDoS Streaming Media Inbound Marketing Laptop Cybercrime Word Paperless Office Taxes Office Tips Chrome Uninterrupted Power Supply Computing Cortana Router Cost Management Computer Accessories Sports Comparison Downtime Co-managed IT IT service Customer Relationship Management Processors USB Augmented Reality Robot Presentation Company Culture Lifestyle Virtual Desktop Text Messaging Cloud Computing VPN Compliance Documents Programming Hack Heating/Cooling Business Growth Net Neutrality Retail Monitors eWaste WannaCry Read Distributed Denial of Service Advertising Google Wallet Shortcut Content Management Value Banking Employer Employee Relationship Troubleshooting File Sharing Licensing Displays Staffing Environment Digital Language Botnet Unified Communications Video Surveillance Drones Disaster Competition Business Metrics LinkedIn Business Owner Upselling Trending Webinar Saving ZTime Access Computer Malfunction Permissions Debate Securty Application Archive Chromebook Mobility Specifications Messenger Writing switches Spyware Point of Contact Work/Life Balance Motion Sickness Tracking Best Practives Digital Signature Download Entertainment Books Windows 10 Thin CLient Cache Microserver Web Server Cryptocurrency Microchip Workers Google Docs Reading Start Menu Analytic Regulations Leadership IT consulting Cleaning Vendor Mangement Turn Key Hacks Samsung Device Management Trojan CIO Public Speaking Relocation Organize G Suite Windows XP Society Entrepreneur Business Mangement Identity Theft Physical Security Notifications Tablets Business Managemenet Micrsooft online Currency HIPAA Electronic Payment Reliable Computing Data Protection Sync IT Management Virtual Reality CCTV Social Engineering Google Maps Mouse IP Address Scalability Corporate Profile Bluetooth In Internet of Things Human Resources Music GPS Google Drive Computing Infrastructure Emails Harddrive Rental Service Skype Upgrades VoIP Memory LiFi 3D Teamwork External Harddrive Wi-Fi Meetings Ebay Storage Telephony Cabling Recycling Deep Learning Private Cloud PDF Electricity Flash Administrator Visible Light Communication Pirating Information Get More Done Adminstration Keyboard Best Available Smart Phones Supercomputer Worker Product Reviews Printer Server Machine Learning Domains

hp supplies medallionLarge2017