top of page

Lenovo Accelerator Application Insecure Update Mechanism – Man-in-the-Middle Vulnerability

If you currently use Lenovo products, take a moment to read this advisory, verify your model number and OS, and uninstall this software if necessary.  Criminals target the largest footprint available to them and Lenovo has a significant market share.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page