Table of Content
We are so confident in our Absolute Investigation Team that if we can’t find your device and return it to you in less than 60 days you can receive up to $1,000 . Absolute enables your essential security tools — antivirus, encryption, VPN and many more — to automatically self-heal, repair, or reinstall when they’re disabled, altered, or otherwise made vulnerable. The Absolute Home & Office client has trojan and rootkit-like behaviour, but some of its modules have been whitelisted by several antivirus vendors.
ESET discovered a first attack in the wild with a rootkit called LoJax that infected vulnerable LoJack configurations. Analysis of Absolute Home & Office by Kaspersky Lab shows that in rare cases, the software was preactivated without user authorization. The software agent behaves like a rootkit, reinstalling a small installer agent into the Windows OS at boot time. This installer later downloads the full agent from Absolute's servers via the internet. This installer is vulnerable to certain local attacks, and attacks from hackers who can control network communications of the victim. My computer was stolen late last year along with quite a bit of other things from my hotel room.
Secure Access Products
Likely the only thing more important than your device itself is the information it contains. Absolute Home & Office comes preinstalled in some Acer, Asus, Fujitsu, Panasonic, Toshiba, Dell, HP and Lenovo machines. Apple, unlike some other PC manufacturers, does not allow the software to be installed in the BIOS. Absolute Home & Office can be installed on Apple computers, but it will be stored on the hard drive instead of the BIOS.
A police report was filed immediately and I activated the absolute home and office software guarantee to try to track down the individuals. Months ensued without any information whatsoever until finally at the end I was told that my computer had not connected... Trust Absolute to maintain compliance, manage secure device lifecycles, and safeguard your assets. If the agent is compromised – maliciously or through negligence – it heals automatically, ensuring a virtually unbreakable connection between the console and your devices. Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network.
Sign in for the full experience.
If the hard drive is replaced or reformatted, the software will be lost. Take action on endpoints to protect data or maintain and prove compliance from anywhere. Over 18,000 companies rely on Absolute to manage and secure their endpoint environments. Ensure uninterrupted secure access with the world’s first self-healing Zero Trust platform. Gain an advantage for ransomware preparedness and recovery across the entire device fleet. Extend self-healing capabilities to devices and apps to ensure that critical controls are always present.
The Investigations and Recovery team forensically mine the computer using key captures, registry and file scanning, geolocation, and other investigative techniques. The team works with local law enforcement to recover the protected device, and provides police with evidence to pursue criminal charges. In the event of theft, a user can log into their online account to remotely lock the computer or delete sensitive files to avoid identity theft. On some Toshiba laptops, rpcnetp.exe is factory-preinstalled by Toshiba on the unit's hard drive. In turn, rpcnetp.exe will download the full agent software and install the rpcnet.exe Windows service.
Create job alert
Absolute Home & Office is a proprietary laptop theft recovery software . The persistent security features are built into the firmware of devices. Absolute Home & Office has services of an investigations and recovery team who partners with law enforcement agencies to return laptops to their owners. Absolute Software licensed the name LoJack from the vehicle recovery service LoJack in 2005.
Absolute gives you the peace of mind knowing that your device is safe, even in the event of a theft, you’ll have the support of a dedicated team to get it back. With over 45,000 devices recovered in 114 countries, getting your device back just got easier. "I sleep better at night knowing that we can find and manage off-network devices. Absolute is like an insurance policy for us, that offers protection that I haven’t seen from any other product out there." With multiple options to fit your specific needs, Absolute’s top priority is keeping all of your devices safe. A deeper level of protection impervious to factory reset, implementation of a new OS, and even a complete hard drive replacement will provide peace of mind to help you sleep at night. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer.
Junior Software Developer - Remote (m/w/d)
Embedded in the BIOS of more than 600 million devices, chances are, you already have it. Local and remote exploitation of the first stage CompuTrace agent, which is used to install the full version after activation or reinstallation of the operating system, was demonstrated at BlackHat USA 2014. This dropper agent is whitelisted by several antivirus vendors and can be used to set up some local attacks, for example to download and install software from different servers.
Absolute® Home & Office is the standard in theft recovery and data protection, with the only Investigations team that both locates your stolen device and gets it back to you. Absolute also gives you control over your device and everything it contains by remotely locking out unauthorized users, or deleting sensitive data. Then, the next time the protected device connects to the internet, it switches to theft mode and accelerates Monitoring Center communication.
Absolute Home and Office Standard includes our dedicated Absolute Investigations Team who will use investigative procedures, forensic tools, and work alongside local law enforcement to recover your device and safely return it to you. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. The persistence module, installed as part of system BIOS/UEFI, detects when the Absolute Home & Office software has been removed. It ensures the software is automatically reinstalled even if the hard drive is replaced, or the firmware is flashed. Once installed, the Absolute Home & Office agent makes itself persistant by making an initial call to the "Monitoring Center".
Absolute Home & Office also supports Intel's AT-p anti-theft protection scheme. If it is unable to phone home within a configurable time interval it will require a special BIOS password upon the next reboot. It can be configured to shut down the machine's power supply immediately in this case, to force a reboot. Maximize the value of your security spend with an unbreakable, undeletable connection to all your devices and data.
The software may be updated by modules, downloaded from a command server. Subsequent contact occurs daily, checking to ensure the agent remains installed and provides detailed data such as location, user, software, and hardware. October is National Cybersecurity Awareness Month, and the very existence of this ‘holiday’ affirms it is more important than ever to make sure your digital data is secure. To help get you on the right track, we’ve put together a quick security checklist of five simple, but impactful, steps you can take to better protect yourself today. Absolute is factory-embedded by these premiere device manufacturers in over 500 million devices. I have had the fortune to not have to use but the peace of mind in knowing my laptop is protected is priceless.