A Dangerous Loophole: Lenovo’s Security Mishap

BY:

Jul 8, 2016

Why Lenovo is telling users to remove an application because of a dangerous loophole.

Lenovo has been urging its users to remove one of its applications after the discovery of a serious vulnerability. Let’s look at the definition of the vulnerability and what it does and how it works. Here’s why Lenovo is advising users to remove a certain application.

Lenovo Security Hole

The Security Flaw in Question

The Chinese Multinational Technology Company discovered a serious RCE vulnerability in Lenovo, which resulted in a publication of a security advisory covering the flaw. The flaw identified was found in the Lenovo Accelerator Application software, which made it possible to exploit a user with “man-in-the-middle” tactics.

The reasons why the Accelerator application is used is because it speeds up Lenovo applications for launch. This application is installed on some desktops and notebooks using the Windows 10 operating system, but it does not affect ThinkStation or ThinkPad devices since it was never installed on these products.

Why Man-in-the-Middle Attacks Are an Issue

A man-in-the-middle attack can pose a serious threat to anyone who values his personal information. These attacks often occur on vulnerable web browsers with an infected server or a malware variant (on an infected machine) that has surveillance capabilities. Man-in-the-middle attack campaigns are utilized on an individual to steal and intercept personal information, financial data and their login credentials. Sadly, many users don’t even realize that they’re being attacked until it’s too late.

How to Avoid a Man-in-the-Middle Attack

A good way to avoid a man-in-the-middle attack is to look into the programs pre-installed on your computer after you initially purchased the machine. Many computers (whether desktop or laptop) come with installed “bloatware,” which are programs that claim to add value but actually do little when helping a computer initially boot up.

Free software trials, vendor support, applications or vendor hardware — and many more — all add a shortcut that launches your browser to a specific website. The end result is that these shortcuts leave opportunities for hackers, so removing the links may be the best way to prevent an attack.

It’s important for a business to understand the applications and programs it works with. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • How to Use Amazon WAM to Centralize App Control" alt="">
    Use Amazon WorkSpaces Application Manager to Centralize App Control

    Amazon WorkSpaces Application Manager (WAM) makes it easier to deploy and manage Windows desktop apps by providing users with virtualized instances that run right inside Amazon WorkSpaces. Key...

    Learn More
  • " alt="">
    How Contact Centers Can Verify a Caller’s Identity With Machine Learning and Amazon Connect Voice ID

    Provide a seamless customer service experience, gain efficiency, and reduce losses from fraud with Amazon Connect Voice ID Key Takeaways: Call centers are the latest targets for fraud, increasing...

    Learn More
  • The Cloud Gets Faster: New AWS Instances Redefine Cloud Performance on cloudhesive.com" alt="">
    Building a Better Learner (You!)

    When it comes to completing difficult exams such as AWS Professional and Specialty certifications, it’s important to master two components: The necessary technical skills being tested The...

    Learn More