March 5, 2015 By Shane Schick 2 min read

Barely a week after becoming the poster child for preinstalling insecure adware, Lenovo says it is changing what it puts on its machines to avoid another Superfish fiasco — though not in time to avoid further investigation by authorities.

Picking Up the Pieces

As detailed in a story on CIO Today, Lenovo pledged to provide McAfee antivirus software to its PC customers free of charge for half a year. It also said it would cut back on software such as Superfish that comes preinstalled on its hardware in a bid to improve the overall security of its products and its users’ data.

Lenovo has been caught in the cross hairs of security critics over Superfish, software that is designed to improve Web browsing experiences by replacing generic online ads with more contextual ones. This opened up a hole through which cybercriminals could bypass the security of HTTPS connections and steal personal information via man-in-the-middle attacks. Lenovo created a tool to automatically deal with the problem within days of it being discovered.

Superfish Investigation

Just as it promises to get its act together, however, Lenovo stands to face greater scrutiny over how this insecure software managed to end up on its PCs in the first place. As Reuters reported, the Connecticut Attorney General’s Office is launching a probe that will delve into Lenovo and the firm that created the Superfish adware.

Though the results of that investigation may not be known for months, Lenovo’s strategy in the meantime appears to be educating everyday PC users about what they’re getting into when they boot up their system for the first time. The company plans to provide a listing of preloaded applications, IT PRO said, which theoretically shifts the onus onto consumers. However, this assumes consumers would recognize the risks, but it may take security researchers or PC reviewers to flag anything that should concern them.

Unfortunately, the worst may not be over for Lenovo. As VPN Creative reported, the network of cybercriminals-for-hire known as Lizard Squad has apparently been boasting about taking down the firm’s site and releasing secrets at a later date. In the meantime, an expert on ZDNet has called for PC manufacturers to publicly disclose how much money they earn by using preinstalled software on their products. For Lenovo and a host of others, admitting those kinds of financial details could mean they have to prove the security of their customers’ personal data is worth even more.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today