• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechSecurity

Cybersecurity at SXSW: Dell expert on the dangers of bloatware

By
Cyrus Sanati
Cyrus Sanati
Down Arrow Button Icon
By
Cyrus Sanati
Cyrus Sanati
Down Arrow Button Icon
March 16, 2015, 4:39 PM ET
LIFESTYLE-US-IT-INTERNET-MUSIC-FILM-SXSW
Banners hang in the atrium of the Austin Convention Center on Thursday, March 7, 2012 on the eve of the opening of the 27th South By Southwest (SXSW) interactive, film and music festival. The 10-day event is a magnet for thousands of technology innovators, independent film-makers and up-and-coming musical performers. AFP PHOTO / Robert MacPherson (Photo credit should read Robert MacPherson/AFP/Getty Images)Photograph by Robert MacPherson — AFP/Getty Images

Cybersecurity took center stage on Sunday at the technology-crazed South by Southwest festival in Austin. Yahoo kicked things off around noon when it unveiled its new end-to-end encrypted email service, which the company claims is an easier and faster alternative to other third-party encryption services. Later on, at Austin’s new JW Marriott, Amadeus Stevenson, CTO of Decoded, led a workshop on cybersecurity, where he taught attendees how to hack their own personal laptops (it was scary easy).

Then in the afternoon, word spread that NSA leakmaster Edward Snowden spoke via teleconference at a super-secret session on the dangers of government surveillance on businesses. The session, which was reportedly attended by roughly 20 hand-picked tech professionals, consisted of a question-and-answer session in which Snowden said that businesses need to come together and collectively do a better job of beefing up their security to protect themselves from government snooping.

Missing in the cybersecurity sessions this year, though, was any discussion concerning last month’s massive security breach involving PC-maker Lenovo and its adware partner Superfish. Lenovo admitted to loading its consumer PCs with an adware bug from Superfish, which analyzes a user’s visual searches so it can place third-party ads on Google search results and other websites—without your knowledge or permission, of course.

To do this, Superfish needs to issue its own encryption certificates which, to make a long and technical story short, makes the Superfish program vulnerable to a dreaded “man-in-the-middle attack.” That’s where a third party can monitor, intercept, and redirect your Internet communication without your knowledge. The breach to Internet security was considered so bad that the Department of Homeland Security got involved, advising Lenovo users to remove the Superfish adware from their computers’ web browsers immediately.

Bloatware has always been a nuisance with new PCs, but the Superfish adware program shows that it can also be quite dangerous. Since the scandal first broke, Lenovo says it will no longer be loading its computers with as much bloatware as before and that it will disclose everything it has added.

To make sense of this incident, Fortune spoke with security expert Brett Hansen from Lenovo rival Dell. Hansen is responsible for the planning, design, and launch of all software on Dell devices. The following interview has been edited and condensed for publication.

Fortune: What exactly is a “man-in-the-middle” attack?

Brett Hansen: Basically, it involves a malicious third-party intercepting something coming off your device and being able to see it and redirect it.

How exactly does a hacker go about doing this?

So, whenever you send something off your device it’s all encrypted—that’s what keeps you protected, right? But because this credential actually has an encryption code, if I can compromise that I can see everything that’s being sent to the Internet off of your device, including your email, browsing history, any sort of transactions you’re doing. Let’s say you go to your bank and you pay some bills. Well, I can watch that whole process take place. I can see it because I have the credential.

So, if you breach my system, could you then take control of my computer?

It would be an additional step, but why would I need to? I can just watch what you’re doing and take advantage of that. Once I have your credential, your entire online experience is now available for me to see.

This all sounds a little bit too easy…

It is! Once you have that credential, your entire online experience is now available for me to see.

Does Dell load its consumer or enterprise PCs with undetectable bloatware?

We do extensive market research to make sure we are not loading software on our machines that our customers do not need or want. So we actually don’t preload many programs on our computers at all.

What do you preload and why?

We preload management software to help you track your computer’s performance and to diagnose issues. Those programs are created by Dell for Dell machines. The only other piece of software that we’ll add is if, for example, we decide to do a 3D Camera, you’re going to need specialized software. So that’s the only other place where we can be adding software because you have to enable that physical piece of hardware. Another example would be optical drives, which have to have special software to allow for Blu-ray.

What about other programs not made by Dell? You know, the ones you make money on.

We do load a few third party applications on our consumer PCs, but only a few and none are hidden. We preload McAfee [antivirus software], Microsoft Office, Dropbox, Adobe [PDF reader and Flash], and the Amazon app. That’s it. And, actually, we will be phasing the Amazon app out soon.

How come?

If our customers are not utilizing a pre-load, it’s coming off our devices; that’s our approach. It’s very straightforward, and I would challenge you to go to a Best Buy or Staples or anywhere else and go look at that Windows 8 Menu and scroll. You’re going to see that Dell has that really tiny set of apps, but with all the other companies, you’re scrolling for a half-hour because they have all this stuff up there.

What’s the biggest threat IT professionals face?

Security is the No. 1 present concern. And the reason why is … end-users are the biggest pain-in-the-neck in security. And there are two different dimensions to that: one is the folks who click on the “cute-idiot” link that is spam, or the ones who open an attachment that is spam. Yes, they’re these very sophisticated attacks that take place over months, but in almost every instance, there is a person who is the attack-point who starts the whole thing. Someone clicks on a link, someone gets infected, and then they—the cyber attackers—use that penetration point to slowly extend themselves in the enterprise. Once I have an IT administrator’s credentials, I could do an awful lot of damage. I don’t care how good your network security is, once I know who you are and I have captured your password…

It’s that easy?

If I can infect your device, yeah. Keystroke counting software is the No. 1 virus in the marketplace. And all that does is capture what you’re writing and where you’re writing it.

If I’m an IT director at, say, Sony, how can you protect the company? How can Dell help to protect a company against another Sony-type hack?

Well, first and foremost, you’ve got to pick the endpoint. The Invincea solution—which we [use] for our commercial devices—is a secure, containerized browser. It works within your existing Firefox, or Chrome, or IE [web browser]. Typically, if you have a normal PC and you open up a browser, when you hit a drive-by attack—which is when you go to a website and it downloads code, that sort of thing—it’s on your device. You’re already infected. At this point, you’re in a compromised position and all you’re doing is trying to mediate the problem. Because our browsers open up in a virtualized sandbox, if you get hacked, it hits the sandbox and infects the sandbox, but your device remains clean.

It’s like creating a ring-fence around your browser—so, yes, your browser will be attacked but not your hard-drive.

Right. Your PC will not be infected.

So why don’t they build this capability into every browser? Is it because it doesn’t work for launching advertisements and cookies?

That’s where it’s a challenge. But for commercial customers, they’re like, “You know what, we don’t care.” It also works on your Office and Adobe applications. So when you open up an email from someone you know, what might have happened is that his email got hacked, he saw that we had a meeting with you, so he sends you an email with an attachment from the email you just had, you open that attachment thinking its benign, while it’s got weaponized code. If you open it in our sandbox environment it doesn’t matter if it has weaponized code because it’s sandboxed, and if it tries to launch anything it’s hidden in the sandbox.

What about the cloud? We are sending things to the cloud and that’s a lot of data that could get “high jacked,” so to speak, by hackers.

As you save a file, it will be encrypted so if you ever lose a device—which, by the way, happens far more often than we think, it causes a lot of data breaches—they can’t get into it. If you ever plug into a USB, or move that file to another device, or move that file to a mobile device, it will still be encrypted. And if you move it up to a OneDrive, or a Dropbox, or a Box, the encryption remains intact. And so you have the key, or your IT might say, “Okay, these two characters also get the key; we trust them, they’re good people.”

Watch more SXSW news from Fortune:

About the Author
By Cyrus Sanati
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.


Most Popular

placeholder alt text
Success
Even with $850 billion to his name, Elon Musk admits ‘money can’t buy happiness.’ But billionaire Mark Cuban says it’s not so simple
By Preston ForeFebruary 6, 2026
2 days ago
placeholder alt text
Success
Gen Z Patriots quarterback Drake Maye still drives a 2015 pickup truck even after it broke down on the highway—despite his $37 million contract
By Sasha RogelbergFebruary 7, 2026
1 day ago
placeholder alt text
Economy
Elon Musk warns the U.S. is '1,000% going to go bankrupt' unless AI and robotics save the economy from crushing debt
By Jason MaFebruary 7, 2026
23 hours ago
placeholder alt text
AI
AI can make anyone rich: Mark Cuban says it could turn 'just one dude in a basement' into a trillionaire
By Sydney LakeFebruary 7, 2026
1 day ago
placeholder alt text
Future of Work
Anthropic cofounder says studying the humanities will be 'more important than ever' and reveals what the AI company looks for when hiring
By Jason MaFebruary 7, 2026
1 day ago
placeholder alt text
Crypto
Bitcoin whales and ETFs are bailing out of the market; UBS warns: ‘Crypto is not an asset’
By Jim EdwardsFebruary 6, 2026
2 days ago

Latest in Tech

CybersecurityJeffrey Epstein
FBI found little evidence Epstein ran a sex trafficking ring for powerful men and concluded a ‘client list’ doesn’t exist
By Michael R. Sisak, David B. Caruso, Larry Neumeister and The Associated PressFebruary 8, 2026
1 hour ago
RetailEurope
Trump’s Greenland crisis triggered a surge in apps designed to help shoppers boycott U.S. goods, though few American imports are on store shelves
By James Brooks and The Associated PressFebruary 8, 2026
2 hours ago
nfl
CommentaryTV
The Super Bowl was made for TV and instant replay was made for visual AI. Here’s how it could be better and what it would look like
By Jason CorsoFebruary 8, 2026
3 hours ago
monkey
CybersecurityAnimals
One way AI won’t ruin the world: tools to crack down on the $23 billion animal trafficking trade
By Eve Bohnett and The ConversationFebruary 8, 2026
4 hours ago
heacock
CommentaryLeadership
I’m a CEO who grew a ‘boring’ air filter business into a $260 million company, and AI is going to help blue-collar, everyday people just like me
By David HeacockFebruary 8, 2026
4 hours ago
AITech
Meta’s multi-million-dollar Super Bowl ads may not just be about its smart glasses—but about selling Wall Street on Zuckerberg’s AI future
By Marco Quiroz-GutierrezFebruary 8, 2026
6 hours ago