SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
OREGON LAW PRACTICE MANAGEMENT

Malware May Be Preinstalled On Your Computer
“For years, users have been blamed when malware infects their computers and repeatedly warned not
to open attachments from unknown email senders or download software from dubious sources. But a
major manufacturer now says that malware sometimes is already preinstalled when purchasers first
open the packaging of their new computers.”

Holy smokes! This comes from a post today at the ABA Journal Law News Now.

The story continues:

A Thursday post on the Official Microsoft Blog blames what it calls a “broken” supply chain for infected
computers on which malware has been installed, embedded in counterfeit versions of Microsoft’s
Windows operating system software.

“A supply chain between a manufacturer and a consumer becomes unsecure when a distributor or
reseller receives or sells products from unknown or unauthorized sources,” the post says, explaining
that cybercriminals have been able to infiltrate the retail market by offering below-cost, malware-
infected products.

“What’s especially disturbing,” the post continues, “is that the counterfeit software embedded with
malware could have entered the chain at any point as a computer travels among companies that
transport and resell the computer.”

So what to do? Certified smart folks will likely have some recommendations. My first thought? Have an
anti-malware, anti-virus product in hand and ready to install the second you break open the packaging
of your new computer. (You may want more than one!) After installation force an update of the
virus/malware/spyware definitions or verify the program has run an update. Next, run a full scan of
your computer. When you’re done, get on Twitter and follow Peter Porcaro (@PorcaroLaw) who
picked up and tweeted this story. Thank you Peter!

For security tips and software suggestions check out the following:

      The 2012 Solo and Small Firm Legal Technology Guide
      CNet Review – Anti-Spyware
      PCMag Review – Security Products
      Road Warrior: Mobile Data Security for Lawyers
      Ten Best Practices for Securing Your Practice’s Data
      Top Security Tips for Your Law Practice
      Securing Your Clients’ Data While on the Road (an oldie, but goodie)

Originally published September 13, 2012 at http://oregonlawpracticemanagement.com/2012/09/13/malware-
may-be-preinstalled-on-your-computer/.

Mais conteúdo relacionado

Mais de Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineOregon Law Practice Management
 

Mais de Oregon Law Practice Management (20)

7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 
Why hiring staff pays YOU
Why hiring staff pays YOUWhy hiring staff pays YOU
Why hiring staff pays YOU
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
The ethics of crowdfunding
The ethics of crowdfundingThe ethics of crowdfunding
The ethics of crowdfunding
 
Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Malware May Be Preinstalled On Your Computer

  • 1. OREGON LAW PRACTICE MANAGEMENT Malware May Be Preinstalled On Your Computer “For years, users have been blamed when malware infects their computers and repeatedly warned not to open attachments from unknown email senders or download software from dubious sources. But a major manufacturer now says that malware sometimes is already preinstalled when purchasers first open the packaging of their new computers.” Holy smokes! This comes from a post today at the ABA Journal Law News Now. The story continues: A Thursday post on the Official Microsoft Blog blames what it calls a “broken” supply chain for infected computers on which malware has been installed, embedded in counterfeit versions of Microsoft’s Windows operating system software. “A supply chain between a manufacturer and a consumer becomes unsecure when a distributor or reseller receives or sells products from unknown or unauthorized sources,” the post says, explaining that cybercriminals have been able to infiltrate the retail market by offering below-cost, malware- infected products. “What’s especially disturbing,” the post continues, “is that the counterfeit software embedded with malware could have entered the chain at any point as a computer travels among companies that transport and resell the computer.” So what to do? Certified smart folks will likely have some recommendations. My first thought? Have an anti-malware, anti-virus product in hand and ready to install the second you break open the packaging of your new computer. (You may want more than one!) After installation force an update of the virus/malware/spyware definitions or verify the program has run an update. Next, run a full scan of your computer. When you’re done, get on Twitter and follow Peter Porcaro (@PorcaroLaw) who picked up and tweeted this story. Thank you Peter! For security tips and software suggestions check out the following:  The 2012 Solo and Small Firm Legal Technology Guide  CNet Review – Anti-Spyware  PCMag Review – Security Products  Road Warrior: Mobile Data Security for Lawyers  Ten Best Practices for Securing Your Practice’s Data  Top Security Tips for Your Law Practice  Securing Your Clients’ Data While on the Road (an oldie, but goodie) Originally published September 13, 2012 at http://oregonlawpracticemanagement.com/2012/09/13/malware- may-be-preinstalled-on-your-computer/.