Furthermore, as this series of malicious software used the LoJack agent during delivery, we dubbed it LoJax. Such research findings reveal that LoJack-targeted attacks are all practices based on security issues revealed by Anibal Sacco and Alfredo Ortega from Core Security Technologies in Users are advised to check their own computers for this software and handle it as required by their own business requirements.
Following are our recommendations on handling this threat. When laptop computers are stolen, most users have no recourse other than to report the theft to law enforcement. Recovering stolen computers proves very difficult for authorities. A study conducted by Ponemon Institute and Dell Computer revealed that, of 12, laptops lost in airports each week, only 30 percent are ever recovered.
When a computer with LoJack for Laptops is connected to the Internet, however, the software silently and securely contacts the Computrace monitoring center. By contacting Computrace when a computer is stolen, the company's theft recovery team staffed by former police officers and security professionals works with local police departments and ISPs to locate and recover stolen systems.
LoJack for Laptops Premium Edition includes the Data Delete option, in which sensitive, proprietary and other information can be erased and overwritten. Using the Data Delete feature, information including personal data stored in cookies, documents and other files typically used to perpetrate identity theft can be remotely deleted, as can be corporate information, customer lists and correspondence including e-mail. Hundreds of thousands of laptops are stolen each year.
Organizations spend millions of dollars replacing systems and managing fallout from leaked private data and proprietary information. Using Computrace's simple agent and proven recovery team helps ensure any organization or user losing a laptop can remotely delete sensitive information when opting for the Premium Edition and exponentially improve North American recovery rates. Have you encountered Computrace LoJack for Laptops?
What do you think? Rate the product and compare the results to what other TechRepublic members think. You will not be able to reactivate the Computrace module once it is disabled.
How can I detect Computrace on a system? The Simplest and most efficient way is to search for rpcnet. If found — you have Computrace activated. Police track laptops through the installation of hardware or software that will help identify and locate the laptop if it is stolen.
These components, which might include GPS tracking chips or monitoring software, are installed on the laptop before purchase.
0コメント