Acer, Asus, Dell, HP, Lenovo install high-risk bloatware in Windows 10

Acer, Asus, Dell, HP, Lenovo install bloatware in Windows 10 that affects the security of users around the world.

Acer, Asus, Dell, HP, Lenovo they sell more than half of all PCs sold globally, they create the hardware in which they install Windows 10, or not, the companies being partners with Microsoft for several decades and registers good revenues from the business.

Although Acer, Asus, Dell, HP, Lenovo are seen as reliable manufacturers, unfortunately in the laptops that come with Windows 10 pre-installed, companies implement bloatware that makes users vulnerable to hacker attacks, which is extremely dangerous.

More specifically, Acer, Asus, Dell, HP, Lenovo implement own software together with Windows 10 and systems that are constantly looking for updates for that software. Well, these update systems are vulnerable, hackers managing to break all those implemented by manufacturers.

Exploiting such an update system, some hackers managed to run code with administrator access in laptops with Windows 10, something that would not have been possible if laptop manufacturers had not implemented their own software in their products.

Updaters are an obvious target for a network attacker, this is a no-brainer. ...the level of sophistication required to exploit most of the vulnerabilities we found is somewhere between that possessed by a coffee stain on the Duo lunch room floor and your average potted plant – meaning, trivial.

The even more humiliating part for the manufacturers is that the existing exploits in their software are extremely easy to exploit, hackers having no problems gaining access to all user information due to the bloatware implemented by the manufacturers.

Basically, when you buy a laptop from Acer, Asus, Dell, HP, Lenovo and install the software recommended by the manufacturer, you know that you are putting your security at risk because this software is developed so poorly that even a hacker without much experience is able to exploit it.