Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Backup Business Computing Hackers Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Efficiency Google Quick Tips Smartphones Gadgets Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Virtualization Computer User Tips Server Network Microsoft Office Network Security Miscellaneous Upgrade VoIP Social Media Windows 10 Windows Unified Threat Management Mobile Device Management Smartphone Operating System Innovation BYOD Ransomware Communication Remote Computing WiFi Vendor Management Android Passwords Marketing The Internet of Things Apps Mobile Computing Firewall Remote Monitoring History Holiday Facebook Managed IT services Users Analytics Data Management Apple Collaboration IT Consultant Save Money Alert Content Filtering Bring Your Own Device Outsourced IT Office Automation Managed IT Services Health Big data Outlook Best Practice Going Green BDR Spam Virus Wireless Technology App Search Windows 8 Phishing Hiring/Firing Lithium-ion Battery Hard Drives Tech Support Productivity Budget Information Technology Encryption IBM Phone System Data Backup Managed IT IT Support Printer Gmail Help Desk Recovery Browser Employer-Employee Relationship Antivirus Internet of Things communications Maintenance Customer Service Administration Education Saving Time Save Time Money Data storage Running Cable Humor Proactive IT Computers SaaS Artificial Intelligence Bandwidth iPhone Tablet Business Intelligence Data Recovery Black Market Two-factor Authentication Document Management Wireless Mobile Device Networking Travel Computer Repair Website Telephone Systems Training Intranet Hacking Securty Update Office 365 Solid State Drive Fax Server Digital Payment Flexibility It Management User Hard Drive Legal DDoS PowerPoint Government Social Networking Avoiding Downtime Windows 10 Word VPN Risk Management Twitter Password Current Events Hosted Solution Hacker Uninterrupted Power Supply Downtime Processors Compliance USB Net Neutrality Presentation Gaming Console Company Culture Virtual Desktop Webcam Documents Programming Business Growth Monitors Heating/Cooling Telephony Trending Cloud Computing Hack YouTube Statistics Settings Retail Disaster Experience End of Support Streaming Media Co-managed IT Inbound Marketing Law Enforcement Politics Public Cloud Chrome Lifestyle Cybersecurity Router Safety Social Laptop Computer Accessories Comparison Customer Relationship Management Mobility Network Congestion Automobile Augmented Reality Office Tips How To Paperless Office Text Messaging Cybercrime Sports Computing Pain Points Start Menu Cortana Robot Cost Management Excel Taxes User Error IT service Electronic Payment G Suite Virtual Reality Pirating Information Music Adminstration Upgrades Spyware Physical Security Social Engineering Tablets Bluetooth IP Address LiFi Data Protection Content Management Sync Computing Infrastructure Human Resources Deep Learning cache CCTV Rental Service Best Practives Google Maps Skype Memory Visible Light Communication Patch Management Corporate Profile Microserver In Internet of Things Wi-Fi Video Surveillance Saving ZTime Assessment Teamwork LinkedIn Emails Scalability Flash Advertising Redundancy Storage PDF VoIP Archive Turn Key Debate Google Wallet Displays Keyboard Consultation Best Available Meetings Trojan Cabling Product Reviews Point of Contact Organize Private Cloud Domains Unified Communications Project Management eWaste Read Administrator Banking Drones Thin CLient Shortcut Value Supercomputer File Sharing Worker Machine Learning Language Permissions Emergency Troubleshooting Environment Distributed Denial of Service Business Metrics Staffing Writing Leadership Competition switches Google Drive Employer Employee Relationship Licensing Business Owner Electricity Botnet Chromebook Device Management Messenger Application Harddrive Work/Life Balance Cryptocurrency Business Technology Specifications Google Docs WannaCry online Currency External Harddrive Computer Malfunction Download Books IT consulting Time Management Digital Signature Cleaning Scam Entertainment CIO Smart Phones Motion Sickness Microchip Mouse Get More Done Reading Printer Server Regulations Windows XP Touchscreen Tracking Analytic Society GPS Knowledge Micrsooft Digital Web Server Hacks Relocation Public Speaking Websites Workers Identity Theft Ebay 3D Tech Terms Entrepreneur Access Notifications Recycling Business Managemenet Reliable Computing Webinar Software as a Service HIPAA Upselling Samsung Capital Productuvuty Vulnerability 3D Printing CrashOverride

hp supplies medallionLarge2017