Restart Chrome: That’s the easiest way to update. The latest patch fixes a zero-day flaw. Translation: Hackers know about it, so update your Chrome browser now.
List: 50+ laptop models are a security risk after bad update
It is always a good idea to update your computer’s operating system and software to the latest versions. This ensures that any security vulnerabilities are patched and that hackers can’t breach your data. Tap or click here for instructions on downloading the latest Windows update, which fixed six zero-day flaws.
But sometimes, an update doesn’t go according to plan. This is what happened with Lenovo, as a seemingly routine firmware update left dozens of laptop models vulnerable to attack.
Read on about how this happened and what you can do about it.
Here’s the backstory
Where Microsoft rolls out updates for its operating system, laptop manufacturers develop firmware updates for computers’ internal components. These updates ensure that the components work as securely as possible without creating vulnerabilities.
But a recent factory-installed update to some Lenovo laptops disabled critical security features. Cybersecurity company ESET is credited for making the discovery.
A vulnerability used during the manufacturing process on some Lenovo Notebooks was mistakenly not deactivated. This may allow an attacker with elevated privileges to bypass the secure boot process and install malicious applications. Translation: Someone with the right know-how could take over your machine and plant malware.
The flaws are tracked as CVE-2022-3430, CVE-2022-3431 and CVE-2022-3432.
Now here’s the good news: A new update is available to fix these dangerous flaws.
RELATED: It’s important to check your laptop battery’s health – here’s how
Here are the models impacted by the flaw:
- D330-10IGL Laptop (ideapad)
- IdeaPad 5 Pro 16ARH7
- IdeaPad 5 Pro 16IAH7
- IdeaPad Duet 3 10IGL5
- Lenovo Slim 7 16ARH7
- Lenovo ThinkBook 15p IMH
- S540-15IML Laptop (ideapad)
- Slim 7 Pro 16ACH6 Laptop (IdeaPad)
- Slim 7-14ARE05 Laptop (ideapad)
- Slim 7-14IIL05 Laptop (ideapad)
- Slim 7-14ITL05 Laptop (ideapad)
- Slim 7-15IIL05 Laptop (ideapad)
- Slim 7-15IMH05 Laptop (ideapad)
- Slim 7-15ITL05 Laptop (ideapad)
- ThinkBook 13x ITG Laptop
- ThinkBook 14 G2 ARE Laptop
- ThinkBook 14 G2 ITL Laptop
- ThinkBook 14 G3 ACL Laptop
- ThinkBook 14 G3 ITL Laptop
- ThinkBook 14 G4 ABA Laptop
- ThinkBook 14 G4+ ARA
- ThinkBook 14 G4+ IAP Laptop
- ThinkBook 14p G3 ARH
- ThinkBook 14s Yoga ITL
- ThinkBook 15 G2 ARE Laptop
- ThinkBook 15 G2 ITL Laptop
- ThinkBook 15 G3 ACL Laptop
- ThinkBook 15 G3 ITL Laptop
- ThinkBook 15 G4 ABA Laptop
- ThinkBook 15P G2 ITH
- ThinkBook 16 G4+ ARA
- ThinkBook 16 G4+ IAP Laptop
- ThinkBook 16p G3 ARH
- ThinkBook 16p NX ARH
- ThinkBook Plus G2 ITG
- ThinkBook Plus G3 IAP
- Yoga Creator 7-15IMH05 Laptop (ideapad)
- Yoga Duet 7-13IML05
- Yoga Duet 7-13ITL6
- Yoga Duet 7-13ITL6-LTE
- Yoga Slim 7 Carbon 13ITL5 (ideapad)
- Yoga Slim 7 Pro 16ACH6 Laptop (IdeaPad)
- Yoga Slim 7 Pro 16ARH7
- Yoga Slim 7-13ACN05 Laptop (ideapad)
- Yoga Slim 7-13ITL05 Laptop (ideapad)
- Yoga Slim 7-14ARE05 Laptop (ideapad)
- Yoga Slim 7-14IIL05 Laptop (ideapad)
- Yoga Slim 7-14ITL05 Laptop (ideapad)
- Yoga Slim 7-15IIL05 Laptop (ideapad)
- Yoga Slim 7-15IMH05 Laptop (ideapad)
- Yoga Slim 7-15ITL05 Laptop (ideapad)
- ideapad 5 Pro-16ACH6 Laptop
- ideapad 5 Pro-16IHU6 Laptop
- ideapad Creator 5-16ACH6 Laptop
Own one of these computers? Update now to fix serious security flaws
You never know when a dangerous flaw is going to appear. For example, HP recently had to patch four dangerous vulnerabilities in its printers that left them exposed to hackers.
Now, several computer models are vulnerable to two security bugs that can have devastating consequences if left unpatched. You must immediately get this critical update if you have any affected models.
Google is an illegal monopoly
A judge ruled Google illegally built and maintained a monopoly in online search by paying to be the default on smartphones. Plus, a website flaw puts democracy at risk, scammers hit the skies, and why wrapping your keys in tin foil could save you trouble.
Android phones are vulnerable to a years-old bug - Is your phone at risk?
Many people think Android devices are more susceptible to cyberattacks than Apple devices. That’s not necessarily true. But while Apple fans need to worry about attacks, Android fans have more threats coming their way.
Update your iPhone and iPad now to patch major security flaw
Known as Patch Tuesday, Big Tech companies from Microsoft to Adobe release updates to fix vulnerabilities. February’s Microsoft update corrects nearly 50 flaws.
But on occasion, a severe flaw that warrants a separate and immediate release pops up. Once discovered, developers often face a race against time to patch the vulnerability before hackers exploit it.
Attention Mac and iPhone users - Your browser might be leaking Google search history
Every time you visit a website or search for something in your Safari browser, it keeps a record of your actions. Apple’s Safari browser saves a copy of your browsing history with website cookies. Tap or click here to lock down Chrome, Firefox, Edge and Safari for maximum security.
Millions of HP computers at risk - See the list
Computer and laptop maker HP was recently warned that a vulnerability had been discovered in several of its products. If you don’t heed the warning, it could have a serious impact on your PC’s security. If you have one of the affected models, you need to patch the flaw immediately. Tap or click here for details on a dangerous router flaw.
Time to patch your router! Yours might be open to a critical flaw being exploited
It is not just iPhones and Android devices that need the occasional update. Computers regularly require newer software or operating systems to remain impervious to hackers. Tap or click here for 20 security secrets hackers don’t want you to know.
More printer issues for Windows? Microsoft releases another fix
This year hasn’t been the best time for Microsoft’s Windows and printer drivers. On several occasions, the company had to release a patch or fix for vulnerabilities.
Its troubles don’t seem to be over because Microsoft rolled out another quick fix to correct pesky printer software. But you don’t need to stress about hackers exploiting the flaw. The update isn’t security-related, but more maintenance.
Use Zoom? This screen-share bug may expose more than you think
The pandemic has forced many businesses to evaluate the feasibility of staff working from home. While on paper it might work, line managers initially struggled to find an easy way to connect with their team. That is where video calling services like Zoom stepped in.
Samsung flaw lets anyone sign in with their fingerprint
Think about all the important information kept on your smartphone. Things like work and personal emails, logins for bank accounts, private photos and so much more can be found on your device.
That’s why it’s crucial to keep them protected the best way possible. You can use a PIN code, facial ID or fingerprint to keep your phone locked. But which provides the best security? Tap or click here to find out.
Researcher paid $60K for finding Facebook bug that let hackers spy on you
Software companies aren’t the only ones discovering bugs in their products. Security researchers often poke holes in well-known systems to find weaknesses, and when they do, they can sometimes profit handsomely.
That’s what being a bug bounty hunter is all about, and it’s a career that can pay off if you know what you’re doing. Tap or click here to see how much Apple will pay you to hack an iPhone.
Update now! Facebook Messenger flaw lets hackers into your PC
When it comes to malware, infection threats are everywhere. Malicious email links, attachments and downloads are still the most common vectors of attack, which means we all need to actively play a role in blocking security threats.
Patch to fix major security flaw in Windows isn't working - here's what to do
It’s not too often our intelligence services step into consumer affairs. Organizations like the CIA and NSA like to remain in the background — it’s how they catch spies and terrorists. But when a security flaw is dangerous enough, the equation changes.