Case Study Of Lenovo

1707 Words4 Pages

Superfish Debacle Lenovo has received public reprimand not once but twice for malicious adware added to their computers. The first exposure was in early 2000’s when Lenovo shipped computers with malicious software, once identified they were restricted for use in the US State department. The second incident was in February 2015, US CERT exposed them for preinstalling Superfish visual discovery software. The visual discovery software tracks images and injects ads on the screen, similar to pop ups, in this process it install its own root certificate which leaves the system infected with a back door for hackers. Lenovo is a Chinese based Company with deep rooted ties to the Chinese Academy of Sciences. The Chinese Academy of Sciences, identified …show more content…

The preinstalled adware is a common practice for PC makers, only to show they have made very little money. To allow preinstalled adware/bloatware at the original equipment manufacturer (OEM) opens the consumer to numerous threats with the largest being an insider threat from the OEM. Perhaps there is an unidentified intent behind this adware from Lenovo “… (only a dope would consider ad-injecting malware to be “value-add”)” but after the security vulnerability became known to Lenovo, the company should have deemed Superfish more trouble than it’s worth.” (Auerbach 2015) Why is Lenovo so persistent to use Superfish? Does Superfish have a stronghold influence over the Lenovo Corporation? “Lenovo’s negligence is simply off the charts, even if it stemmed from little more than corporate penny-pinching.” (Auerbvach 2015). Could it be possible that Lenovo could be receiving pressure from their …show more content…

Cybersecurity is a serious issue the U.S. faces today, cyberattacks and cybercrimes are national-security threats with the possibility for disastrous consequence. Adam Lowther has identified the properties of cyberspace as unbounded and changes rapidly, a domain that is jurisdictionally complex, and provides a low cost of entry for the adversary as the United States evolves into being asymmetrically dependent on cyberspace (Lowther, 2012), what is the best way to ensure you are not being hacked? With the realization of not being able to achieve cybersecurity, companies should focus their efforts on cyber deterrence. Deterrence offers much more flexibility and increased options while achieving cybersecurity. Cyber deterrence includes options such as taking legal action and making networks invisible, maintaining resiliency. Appling Lowther’s concept of decision-making calculus through assurance and avoidance by reducing the probability of success, increasing the cost to the adversary while reducing the attack surface with agility (Lowther, 2012). These assurance and avoidance techniques should all be applied when attempting to deter the

More about Case Study Of Lenovo

Open Document