Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

This is the situation that two companies found themselves in after security researchers discovered malware on 40 different company-owned devices. The firm that made the discovery, Check Point, also determined that the malware had been installed at some point while the devices were still in the supply chain. Many of the devices required a full reinstall to get rid of the malicious programs, as system privileges were used to install them.

These devices included:

  • Galaxy Notes 2, 3, 4, and 5
  • Galaxy Note Edge
  • Galaxy Tab 2 and S2
  • Galaxy S7 and S4
  • Galaxy A5
  • LG G4
  • Xiaomi MI 4i and Redmi
  • ZTE x500
  • Opportunities N3 and R7 Plus
  • Vivo X6 Plus
  • Nexus 5 and 5X
  • Asus Zenfone 2
  • Lenovo S90 and A850

Many of these devices were found to have many varieties of malware installed on them. While most were ad displaying programs and information-stealing varieties, both the Loki malware and Slocker mobile ransomware were also discovered.

These two companies, who have not been named, are by no means the first examples of production-stage malware installations. However, it does provide an excellent opportunity to revisit the importance of having all devices used for business purposes thoroughly vetted before putting them to use.

These unnamed companies serve as cautionary tales for businesses everywhere: you can never be too diligent in securing your technology. It is evident that malware distributors may be found everywhere, and they can be resourceful as they find new ways to introduce their tools into your systems. Also, this doesn’t mean if you have one of these devices, it’s definitely a risk to your data, but it is important to be aware that even a brand new device can already be infected, so centrally controlling access to your company data is very important.

What do you think? Are you concerned about the prospect of pre-installed malware being present in your company devices? Share what you think with us in the comments section.

$100 Million Hacking Incident Shows that No Compan...
Tip of the Week: 3 Best Practices to Organize Your...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Managed Service Provider Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Mobile Devices Business Continuity Disaster Recovery Computer Mobile Office Virtualization Network Microsoft Office Server VoIP Social Media Windows 10 Upgrade Mobile Device Management Miscellaneous Unified Threat Management Windows Android Ransomware Smartphone Passwords Holiday Operating System Remote Computing Innovation Remote Monitoring WiFi Vendor Management Mobile Computing BYOD Communication The Internet of Things Marketing Collaboration Apps Facebook Users Analytics History Firewall Managed IT services IT Support Apple Data Management Alert Outsourced IT Cybersecurity Managed IT Services Phishing IT Consultant Save Money Big data Content Filtering Health Bring Your Own Device Office App Productivity Automation Gmail Best Practice Tech Support BDR Spam Going Green communications Budget Wireless Technology Search Outlook Managed IT Lithium-ion Battery Virus Hiring/Firing Hard Drives Browser Windows 8 Artificial Intelligence Cost Management Printer Information Technology Encryption IBM Mobile Device Data Backup Update Maintenance Office 365 Money Phone System Help Desk Antivirus Recovery Internet of Things Employer-Employee Relationship Bandwidth Risk Management Humor Document Management Networking Customer Service Saving Time Travel Education It Management Hard Drive Law Enforcement Administration Data storage Save Time Legal Proactive IT Running Cable Computers Government SaaS Cortana Password iPhone Business Intelligence Hacker Black Market Avoiding Downtime Project Management Business Growth Tablet Computer Repair Two-factor Authentication Telephone Systems Current Events Excel Wireless Training Intranet Website Disaster End of Support Securty Mobility Solid State Drive Hacking Flexibility Digital Payment Windows 10 Comparison User PowerPoint Social Networking DDoS VPN Data Recovery Twitter Hosted Solution Fax Server Robot Word Compliance Net Neutrality Social Engineering Cloud Computing Computing Infrastructure Hack Downtime Processors USB Presentation Company Culture Telephony Trending Monitors Virtual Desktop Pain Points Distributed Denial of Service Programming YouTube User Error Statistics Documents Heating/Cooling Settings Public Cloud Unified Communications Gaming Console Streaming Media Retail Inbound Marketing Webcam Experience Politics eWaste Automobile Scam Chrome Router How To Cryptocurrency Digital Computer Accessories Google Docs Laptop Customer Relationship Management Start Menu Augmented Reality Safety Mouse Specifications Taxes Office Tips Software as a Service Social Access Control Uninterrupted Power Supply Paperless Office Text Messaging Bitcoin Co-managed IT Sports Network Congestion Computing Data Security Lifestyle Cybercrime Google Maps IT service Patch Management Data Loss Public Speaking Corporate Profile Virtual Reality Pirating Information Tip of the week In Internet of Things Music Adminstration External Harddrive Assessment Emails Upgrades Entrepreneur Bluetooth Evernote Scalability LiFi Redundancy Data Breach Content Management VoIP Virtual Assistant HIPAA Business Managemenet Smart Phones Get More Done Consultation Rental Service Electronic Payment Meetings Deep Learning Cabling Memory Data Warehousing Private Cloud Visible Light Communication Printer Server Audit IP Address Wi-Fi Video Surveillance Hard Drive Disposal Administrator LinkedIn Human Resources Supercomputer Saving ZTime Worker Flash Windows Server 2008 Machine Learning Advertising Emergency Computer Care Archive Debate Unified Threat Management Google Wallet Skype Google Drive Employer Employee Relationship Displays Licensing Windows 7 Teamwork Upselling Webinar Vulnerability Point of Contact Printing Electricity Banking Fiber-Optic Storage Botnet Drones File Sharing PDF Thin CLient Keyboard Language Freedom of Information Best Available Permissions Business Technology Downloads Domains WannaCry Business Metrics Fraud Computer Malfunction Product Reviews Read switches Best Practives Time Management Writing Leadership Shortcut News Value Microserver Google Calendar Chromebook Device Management email scam Troubleshooting Motion Sickness Staffing Touchscreen Messenger Environment Tracking Competition Work/Life Balance Fake News Knowledge Turn Key Technology Tips online Currency Download Vulnerabilities Business Owner Web Server Mobile Technology IT consulting Trojan Websites Books Workers Tech Terms Application Microsoft Excel Cleaning Organize CIO Access Microchip Business Cards Samsung Regulations Mobile Payment Windows XP Reading Digital Signature G Suite Society GPS Spyware Hacks Entertainment Physical Security Micrsooft Tablets Television Relocation Data Protection Identity Theft Ebay Blockchain Sync 3D Analytic cache Notifications Recycling CCTV SharePoint Harddrive Reliable Computing Capital Productuvuty CrashOverride 3D Printing Piracy Software License

hp supplies medallionLarge2017