Sunday, February 22, 2015

Lenovo: A software against the Superfish – Reuters

Aggressive: A software called Superfish may endanger the safety of Lenovo PCs

(Photo: AP)

The world’s largest PC maker Lenovo has released a program to automatically remove the aggressive marketing software Superfish of his computers. The pre-installed on Lenovo computers software showed additional advertising when searching with Google, but was also a security risk, because they could nullify the encrypted data transfer with their help. IT professionals have discovered this feature this week.

Lenovo began by stating that they had Superfish not installed since January, because users have complained, and gave instructions on how to manually remove the program. The security risk is Lenovo was not known to the warnings from this week.

Protection against data thieves

  • “vhb shorttext vhb active”>

    “11” It sounds obvious: Users should protect their passwords good , But not a few stick a post-it with access to the monitor or even save it in a file on the computer. Both are risky – if intruders get into the office or on the computer, they can also access the emails or the content management system

  • It is the classic: The e-mail is a funny cat picture or a sensational Video announced. If you load the attachment down or click on the link, but you catch himself a virus. Therefore, there is a rule attachments and links to examine critically well messages from unknown senders.

  • A common method of attack: let hackers prepared USB sticks are in the parking lot or in the cafeteria – and hope that unsuspecting employees connect the device to the PC. This scam works shockingly well. The lesson: Users should be used with extreme caution with unknown storage media

  • Whether the café or at the airport: Who is using his smartphone or notebook a public Wi-Fi network, taking a risk. If you want to retrieve sensitive data, you should do this, for example, possible only with an SSL connection. For more tips, the Federal Office for Information Security (BSI).

  • On the train or airplane passengers can easily catch a glimpse of the notebook or smartphone – and get so potentially sensitive information with. Security experts advise, therefore, to look for so-called shoulder surfers and to let in doubt closed the file. In addition, they recommend not to let the device only briefly from the eye.

  • Apps can make life easier, but also more uncertain: Many applications have retrieved information that probably do not want to pass on to users. Straight Android users should check exactly which permissions demands a program and do not put in doubt away from it. The same applies to PC users, download the programs from the user and install. Particularly illegal copies are often contaminated.

  • Although perhaps it may annoy if every time you have to enter a code before you can use your smartphone. However, a barrier is most useful if the device is lost or stolen. Many companies stipulate such a physical security. In the office, it may well be a good idea to lock your computer while you have a meeting or going to lunch.

  • this tip also is known, it is nevertheless often not taken to heart: Users should use the software on your computer always keep up to date. This is true not only for the virus scanner, but also the operating system and application programs such as browsers or word processing. Potential attackers can exploit many gaps to inject malicious software on the device.

  • The software called Superfish turns between secure connections. When you call supposedly secure sites such as online banking is Superfish can dial without the user noticed anything about it. Security experts were appalled

    Topic:. IT industry

    Topic: Top News Company

    LikeTweet

    No comments:

    Post a Comment