Customs Today
  • Home
  • Islamabad
  • Karachi
  • Lahore
  • National
  • Transfers and Postings
  • Chambers & Associations
  • Business
No Result
View All Result
Customs Today
  • Home
  • Islamabad
  • Karachi
  • Lahore
  • National
  • Transfers and Postings
  • Chambers & Associations
  • Business
No Result
View All Result
Customs Today
No Result
View All Result
Home Science & Technology Technology

Superfish security threat: Lenovo fails to protect users, work flexibility increases risk

byCustoms Today Report
24/02/2015
in Technology
Share on FacebookShare on Twitter

SAN FRANCISCO: A new malware has been found in the notebook series of Lenovo launched between October 2014 and January 2015. The malware has been named as Superfish security risk. Lenovo acknowledges the risks of Superfish adware, as new details emerge on how widespread other vendors’ use of the underlying technology is.

Lenovo is now changing its stance on the Superfish adware that was bundled on some of its PCs between October 2014 and January 2015. Initially, Lenovo claimed there was no security risk from Superfish, but as it turns out, the risk is real and it extends beyond just Lenovo.

You might also like

Tesla driverless system to use updated radar technology

12/09/2016

Apple to develop its own self-driving technology

10/09/2016

The discoveries are the latest in a string of revelations that indicate that as traditional security defenses have begun fully to surround the outer layers of our devices, criminals, nation-states’ hackers and apparently advertisers have turned their focus inward, to the very heart of the machine, where their code is easily concealed.

Perhaps it’s improbable that your sites are affected, but a Pandora’s box has been opened. Consider that if it was this easy to insert root certificates that can spoof away at will, are your cloud and other host certificates legitimate? How would you know? Are your security people taking vacations soon?

I get the nagging feeling that this might be the tip of an iceberg. How many super cracks have you seen in the past 30 days? Imagine a hapless user, hopefully NOT your CFO, opening a benign email with a payload that monkeys with his/her root cert cache, or worse, your organization’s root/CA cache. It’s script kiddies from there. They’ll eat your lunch between cartoon shows.

Worse still, your builds might be compromised. It’s something that few people check. Hey, Ernie, did you and Kate check that build for its browser root certs? Say what?

This is bad news. We need a cert for our certs. We need an impenetrable method of guaranteeing that top-level certs, or even subsidiary certs, aren’t corrupted or surreptitiously appended.

Related Stories

Tesla driverless system to use updated radar technology

byCT Report
12/09/2016

WASHINGTON: Electric carmaker Tesla announced Sunday it was upgrading its Autopilot software to use more advanced radar technology. In a...

Apple to develop its own self-driving technology

byCT Report
10/09/2016

SAN FRANCISCO: Apple may not become an automaker, but it still wants to develop its own self-driving technology. The iPhone-maker's...

‘YouTubers’ outshining old-school television

byCT Report
09/08/2016

SAN FRANCISCO: A media revolution is taking place, and most people over 35 years of age aren’t tuned in. Millennial...

Google pays tribute to Edhi

byCT Report
11/07/2016

ISLAMABAD: The technology giant, Google, has paid tribute to renowned social activist, philanthropist and humanitarian Abdul Sattar Edhi by placing...

Next Post

Costa Rica’s exports in January remain $725.6m, shows 2.9% growth

  • Terms and Conditions
  • Disclaimer

© 2011 Customs Today -World's first newspaper on customs. Customs Today.

No Result
View All Result
  • Transfers and Postings
  • Latest News
  • Karachi
  • Islamabad
  • Lahore
  • National
  • Chambers & Associations
  • Business
  • About Us

© 2011 Customs Today -World's first newspaper on customs. Customs Today.