Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income stream, going so far as to include adware that generates revenue through monitoring users' surfing habits, for example. While some software such as virus scanners can be useful, Lenovo, the world’s biggest computer seller, has discovered just how badly it can backfire when including insufficiently tested – or just plain malicious – software. With vendors often doing little in the way of due diligence, third-party software can include those with backdoors, or which could present privacy problems, or contain ways to trick users into paying for subscriptions. More often the focus is on pushing content and advertising, based on tracking user’s web browsing habits, or targeted marketing, where search results from trusted sites such as Google are tampered with before they’re presented to the user.
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware
Other Type | Newspaper Article |
---|---|
Publication Date | Feb 24, 2015 |
Deposit Date | Aug 14, 2015 |
Publicly Available Date | May 15, 2017 |
Keywords | Cybersecurity; computer programming and sofware; malware; Lenovo |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/8768 |
Lenovo's security debacle reveals blurred boundary between adware and malware
(<nobr>457 Kb</nobr>)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
(<nobr>794 Kb</nobr>)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nd/4.0/
A framework for live host-based Bitcoin wallet forensics and triage
(2022)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2022)
Journal Article
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
(2022)
Journal Article
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
(2022)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search