Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

$100 Million Hacking Incident Shows that No Compan...
Tip of the Week: 3 Best Practices to Organize Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Business Computing Software Managed Service Provider Backup Workplace Tips Productivity Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Gadgets Quick Tips Smartphones Mobile Devices Business Continuity User Tips Computer Disaster Recovery Mobile Office Virtualization Microsoft Office Network VoIP Social Media Server Mobile Device Management Smartphone Android Windows 10 Miscellaneous Upgrade Innovation Windows Ransomware Unified Threat Management Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords BYOD Communication Apps Collaboration WiFi Vendor Management The Internet of Things Facebook Marketing Cybersecurity Analytics History Users Apple Firewall Managed IT services communications IT Support Productivity Data Management Alert Internet of Things IT Consultant Managed IT Services Outsourced IT Phishing Save Money Big data App Content Filtering BDR Spam Bring Your Own Device Office Health Automation Gmail Information Technology Best Practice Going Green Bandwidth Mobile Device Budget Windows 8 Wireless Technology Search Tech Support Lithium-ion Battery Data Recovery Hiring/Firing Hard Drives Managed IT Outlook Antivirus Maintenance Browser Artificial Intelligence Virus Data Backup Cost Management Phone System IBM Encryption Printer Update Hacking Money Office 365 Help Desk Recovery Employer-Employee Relationship Risk Management SaaS It Management Document Management Hard Drive Customer Service Two-factor Authentication Saving Time Intranet Travel Website Humor Education Networking Training Save Time Law Enforcement Data storage Proactive IT Running Cable Computers Cloud Computing VPN Government Administration Legal Cybercrime Cortana Password iPhone Business Intelligence Hosted Solution Hacker Robot Downtime Tablet Social Engineering Company Culture Compliance Mobility Computer Repair Black Market Wireless Fax Server Business Growth Windows 10 Telephone Systems Avoiding Downtime Access Control Disaster End of Support Digital Payment Data Security Securty Current Events Comparison Excel Augmented Reality User Solid State Drive Data Loss PowerPoint Flexibility Social Networking Data Breach Laptop DDoS Twitter Project Management Word Bitcoin Paperless Office Net Neutrality Sports Distributed Denial of Service Computing Blockchain Public Cloud Identity Theft Processors IT service USB Presentation Business Technology Co-managed IT Virtual Reality Trending Virtual Desktop Bluetooth Scam Automobile Computing Infrastructure Lifestyle Documents Programming Statistics Heating/Cooling How To Telephony Monitors Digital Websites Streaming Media Retail Tech Terms Start Menu Inbound Marketing Taxes Experience eWaste YouTube Software as a Service Settings Value Unified Communications Chrome Uninterrupted Power Supply Router Pain Points Data Protection Computer Accessories Customer Relationship Management User Error Politics Patch Management Google Maps Specifications Mouse Safety Emails Social Redundancy Gaming Console Text Messaging Cryptocurrency Google Docs Network Congestion Vulnerabilities Hack Mobile Technology Webcam Cleaning Private Cloud Office Tips Regulations Tech Term Society Emergency Worker Pirating Information Machine Learning Adminstration Public Speaking Hacks Micrsooft Computer Care Piracy Turn Key Television Employer Employee Relationship Trojan Relocation Entrepreneur HTML Google Drive HIPAA Vulnerability Content Management Business Managemenet Licensing Organize Notifications Electronic Payment Printing Software License Electricity Botnet SharePoint Reliable Computing Devices Music Tip of the week Video Surveillance IP Address Human Resources Upgrades Downloads LinkedIn IT Plan WannaCry Computer Malfunction Saving ZTime Evernote LiFi Accountants Time Management Archive Skype Virtual Assistant Debate Rental Service Deep Learning Google Calendar Migration Motion Sickness Harddrive Data Warehousing Tracking Memory Teamwork Visible Light Communication Equifax Touchscreen Point of Contact Storage Knowledge Hard Drive Disposal Wi-Fi PDF Technology Tips Desktop External Harddrive Web Server Thin CLient Windows Server 2008 Workers Keyboard Flash Best Available Advertising Startup Google Wallet Product Reviews Unified Threat Management Domains Leadership Get More Done Displays Read Applications Access Smart Phones Smart Tech Windows 7 Samsung Printer Server Shortcut Troubleshooting Drones Fiber-Optic Device Management G Suite Banking Physical Security Staffing File Sharing Environment Mobile Security Spyware Multi-Factor Security Freedom of Information Tablets Competition Language Permissions Business Owner online Currency Fraud Sync Business Metrics CCTV Writing switches UTM cache Legislation Upselling News Webinar Application email scam Corporate Profile In Internet of Things Chromebook Messenger Multi-factor Authentication Assessment Wireless Headphones Fake News Scalability GPS Work/Life Balance Digital Signature Download Entertainment VoIP Meetings Best Practives Books IT consulting Device security Consultation Microsoft Excel Cabling Ebay 3D Microchip Audit Analytic CIO Business Cards Recycling Microserver Administrator Mobile Payment Supercomputer Reading Windows XP Productuvuty CrashOverride 3D Printing Nanotechnology Capital