Jump to content

Recommended Posts

Posted

You might think that a company that has been caught installing malware once, would be extremely cautious that it wouldn't happen again. Not so Lenovo.

 

Back in February 2015, users discovered that the Chinese based Lenovo put pre-installed dangerous, HTTPS-breaking adware called Superfish in its notebooks. At first they denied that the adware posed any threat to your privacy, but they quickly changed their tune. Check if you are infected with Superfish here. Lenovo's uninstall program can be downloaded here.

 

Fast forward to August 2015 and news appeared that Lenovo is – again – caught because they are using a rootkit to make sure their software remains installed, even on clean Windows installs. The rootkit is able to have the BIOS overwrite Windows system files on bootup.

 

More information can be read here.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...