The vast majority of laptop manufacturers have developed updated software so that, automatically, they are sent to users. This is an automatic process and that many feel that is free of problems. But the truth is that most have security holes, as has now been proven. Problems and failure are well known to have been discovered in the update software of different brands of portable endanger the safety of users data.
A study by the security firm Duo Security has shown that after all these failures are not contained to some manufacturers, but are widespread and can be exploited with frightening ease. These failures result from weak security measures and mechanisms that allegedly facilitate all these processes, but ultimately expose users MiM attacks (man-in-the-middle) and that lead to it possible for attackers to execute code on laptops attacked.
According to Duo Security, most laptop manufacturers have this problem, and they do not escape names such as Acer, ASUS, Dell, HP or Lenovo. These “attacks” to prove the failures took place over several months and ended in April this year. This may mean that these flaws have since been corrected, but the more likely they are still present in equipment. The faults, in most cases, based on the incorrect implementation of the TLS mechanisms and in some cases what happens is that not all the received update packet is checked.
Even when buying focuses on a laptop with the Signature Edition of Microsoft, which should ensure a machine without this software, the problem exists and is active. Brands try to correct the problems but normally release only specific updates and are designed to address the specific failures, not implementing models really safe, as would be expected. It is, once again, proved that the update software is not the best solution and that only bring bloatware and much more serious problems for users.