We are sorry, eCoupon {0} {1} has been fully claimed
We are sorry, eCoupon {0} {1} has been fully claimed.
{0} coupons left to claim
Build Your PC
View {0} Model
View {0} Models
Add To Basket
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
This model is configurable! Click Build Your PC to start configuring.
• Shop & Get Rewarded
• Redeem & Save
• Member Exclusive Offers
• FREE to Join - Join now!
Coming Soon
New Options Available
Available Soon
Price Match Guarantee
Lenovo Outlet Price
Your price
List Price
List Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Web Price:
Exclusive Price:
Starting At
Instant Savings:  
eCoupon Savings:  
Additional Savings
Show Price Breakdown
Hide Price Breakdown
Use eCoupon
Key Details
Part Number:
See More
See Less
Coming Soon
See More Details
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
One moment please...
Search on Lenovo.com Public Website
& Up
Shipping Options
Update PostCode
Response Error
Input Format Error
Shipping options for {0}
Specs Text Link
Specs Teaser Content
Specs Teaser Link
Learn More
Show Details
Hide Details
View more details
Includes {qty} item
(qty: {qty})
read more
Join Now!
*Savings cannot be combined
Phone Sales Hours
Monday-Thursday: 8:00AM-6:00PM
Friday: 8:00AM-4:00PM
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
Use My Current Location
Enter Zip Code
Store Pickup
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
Pickup Availability near {0}
Update Location
All Eligible Items
Pickup Location for: {0}
{0} Miles Away
In Stock,
in {0} Days
Ready {0}
Open until {0}
Get Directions
Select This Location
Use My Current Location
Enter Zip Code
Store Pickup
Pickup unavailable
Available Today at select {0} locations
Get it today!
Get it tomorrow!
Lenovo and Best Buy have partnered to allow you to pick up Lenovo products at your local Best Buy. Choose a location near you and get it as soon as today!
Choose a pickup location
See all pickup locations
Ready {0}
at {0} {Store Name}
After eCoupon limit is met, price is {nonEcouponPrice}
After eCoupon limit is met, price is {nonEcouponPrice}
Expiration Date:
Remaining Units:
My Price:
Hide quote dialog
Sign in or Create an Account
Sign In
Email Address
Not enrolled for Rewards? Join Now
By joining, you agree to the
Terms & Conditions
Remember me
Forgot your username or password?
Create an Account
You can store addresses, easily keep track of your orders and save items in your basket for later.
Create an Account to Save Your Basket
Create an Account
You can store addresses, easily keep track of your orders and save items in your basket for later.
The email format is incorrect, please try again
First Name
Maximum length is 50 characters
Last Name
Password must have at least
8-20 characters
Include three of the following: letters, numbers, and symbols($!#&)
Confirm Password
I agree to opt-in to Lenovo communications and I understand that my data will not be shared.
Yes, I have read and accepted the Terms of Use and Privacy Policy.
Please agree the terms and privacy policy
By joining, you agree to the Terms & Conditions.
If you would like to earn Rewards, you will need to check the join Rewards checkbox above. To create an account without earning Rewards, register below.
Sorry, the Email you entered is incorrect
Sorry, the password you entered is incorrect
We’re sorry, there are no locations within {0} miles.
Please update your location or select from available Best Buy locations below that exceed {0} miles.
Please enter a zipcode
Invalid Zip Code, please try again.
FPS for this system per game
within {Miles} miles
in {Store Name}
TELE DLP Click Here
Best Buy Store,
Delivery Unavailable
No available data
Save to:
My List
Create a List
{0} items
You must fill in this field
You currently have no saved lists
Guest List
List name is repetition
{0} item
Only a maximum of 15 lists can be created
Maximum character limit 200
Your wish list capacity is full, please remove lists and/or products to wish for more.
List at maximum, please remove items to wish for more products.

The prices quoted for a particular make and model of device are for genuine, fully working devices with acceptable cosmetic conditions and operating performance regardless of age.

Your device Estimated
trade-in value

Information is provided by our partner Envirofone and it is not a contractual offer.       Get Your Quote

Click here to find more products >>

You're leaving Lenovo.com

Exclusive Loyalty Price
Loyalty Savings
Your session is about to time out
Would you like to stay signed in?
Sign Out
Stay Signed In
Compare ({sum})
In your cart
In Your Cart & Compared
Your Price
Quick View
View All Details
Tech Specs
Select from
by {startDate}
between {startDate} {endDate}

What is Spoofing?

This is a recommends products dialog
Top Suggestions
Starting At
View All >
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Basket!
Sign in or Create an Account to Join Rewards
View Basket
Your basket is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today.
item(s) in cart
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
There's something wrong with your basket, please go to basket to view the detail.
Contains Add-ons
Proceed to checkout
Popular Searches
skip to main content

Want a laptop that has it all?

  • Superior performance where you need it most
  • Communicate confidently with built-in intelligence
  • Nearly 3X faster internet with Intel® Wi-Fi 6/6E (Gig+)1
  • Fast-charging, long-lasting battery

What is Spoofing?

Spoofing is a type of cyber-attack that involves impersonating a computer, device, or user in order to gain access to protected information or systems. The attacker can use different methods like IP address spoofing, domain name spoofing, and email spoofing. In some cases, the attacker may even use a technique called 'social engineering' to get control of the target's account.

What does IP address Spoofing mean?

IP address spoofing means the attacker uses a different IP address than their own in order to hide their identity or to access someone else’s data. When sending out malicious data packets, it can be hard for security teams to tell where these packets come from if the attacker is using an IP address that looks similar or identical to legitimate ones.

How does domain name Spoofing work?

Domain name spoofing works by creating a domain name that appears legitimate but actually links back to a malicious website controlled by the hacker. This way they can send out emails with official looking web addresses and deceive users into clicking on them and giving away sensitive information such as login details or payment information.

How is email Spoofing used?

Email spoofing is commonly used in phishing attacks where attackers create emails with realistic sender names and messages which are designed to trick users into providing personal and financial data such as passwords and credit card numbers. Cyber criminals often use these techniques in order to steal money or gain access to confidential company data.

What is social engineering?

Social engineering is when an attacker uses psychological manipulation techniques in order to get somebody’s trust and convince them to take action that provides access or discloses confidential information about themselves or their employer. Often times this kind of attack involves fake websites where users are asked for personal details such as passwords and bank account numbers which are then harvested for malicious purposes by cyber criminals.

Can anti-virus software protect against social engineering attacks?

Anti-virus software can help protect against certain types of attacks, but it cannot always provide complete protection against social engineering attacks as they rely heavily upon human behavior rather than technical weaknesses in software design that antivirus programmers look for and block. Therefore, it's important for organizations and individuals alike to be aware of potential threats posed by social engineering and take steps to mitigate them through education, training and having protocols in place which outline how staff should respond if potentially malicious activities are discovered within their networks or on end user devices connected via corporate networks.

What other measures can be taken against computer hacking attempts?

Organizations can deploy additional measures such as firewalls, intrusion detection systems (IDS) and malware scanners which can detect suspicious network activity before it has too severe consequences. Additionally, companies should regularly review access permissions given out across their networks so only those who need access have it, this helps cut down on any unauthorized people being able to log into sensitive areas within your system unknowingly giving cyber criminals an easy route into accessing crucial files without being detected quickly enough. Additionally regular password resets will help ensure passwords remain secure at all times rather than falling prey over time due to attrition-based attacks, whereby attackers try cadging old passwords from databases stored within webhosts.

How do I find out more about computer security measures?

Computers security measures have become increasingly complex over time due both new technologies arising but also the increasingly sophisticated nature of hackers deploying their own technologies in order mix up attack vectors (whereby multiple vulnerabilities are exploited simultaneously). It's important therefore for any organization serious about protecting its assets online keep updated on latest industry news/developments + undertake regular internal reviews/audits related its current setup so potential loopholes become immediately visible and addressed accordingly if needed.

Are there any organizations I could contact if my system was hacked?

Yes; if you believe your system has been hacked then you should contact your localized Police force and seek advice from either professional specializing IT forensics who may undertake an official investigation; additionally, you could contact official bodies charged with regulating online safety and security, either within your country or internationally (e.g., ICANN). Having professional/official support when dealing with such situations is always wise given the highly sensitive nature of any incident related hacking possess when attempting to resolve any issues raised during the investigation process.

When should I check my computer system for signs of compromise?

If you notice something unusual happening while using your computer, such as programs running unexpectedly, then you should investigate further immediately as this could indicate previous activity related untrusted sources attempting access personal files/information stored within device itself. Additionally, regularly scheduled scans using anti-virus type applications should be conducted every month at minimum just to ensure there are no unexpected intrusions preying upon existing vulnerabilities present across installed.

What types of computers are most vulnerable to Spoofing attacks?

All computers and devices that use networking protocols such as TCP/IP are vulnerable to spoofing attacks, although desktop and laptop computers are more likely to be targeted due to their greater market share. Devices running on older operating systems such as Windows XP and Windows Vista may also be particularly susceptible depending upon how well those platforms were designed from a security standpoint. Additionally, mobile devices such as tablets and smartphones can also be targeted, with it being paramount having anti-virus type software installed on them in order reduce chances attack being successful.

Are there any risks associated with using a public Wi-Fi network to access the internet?

Yes, when accessing webpages or services through an unsecured public Wi-Fi network one may fall prey to a number of potential attack vectors; this is due the fact adversaries could potentially listen in on all outgoing/incoming traffic (including sensitive data packets like login details) + inject malicious code into the stream in order hijack user sessions. As such, it's always wise connecting public networks use either VPN type applications so as encrypt communications and reduce chances attack being successful or simply avoid performing activities where personal/sensitive information being transmitted altogether.

What are some tips for protecting myself from malicious software?

Some tips for protecting oneself from malicious software include:

  • Keeping all operating system and applications up to date, with security patches applied accordingly.
  • Installing anti-virus type software, such as Microsoft's Windows Defender, on all devices that connect to the internet.
  • Setting up firewalls to help filter out potential malicious traffic.
  • Not clicking suspicious links or opening attachments in emails.
  • Using unique passwords for all accounts, preferably those with two-factor authentication enabled.
  • Ensuring network connections are always secured by using HTTPS when accessing websites/applications.

How can cloud-based services help keep data secure?

Cloud-based services can help keep data secure by encrypting the data stored in their servers, so that only the customer has access to it. Furthermore, cloud providers can monitor and detect any unauthorized access or malicious activity. Additionally, they offer extra layers of protection such as authentication and authorization methods to ensure that only authorized personnel have access to the data. They also regularly back up their customers' data, ensuring that even if a breach does occur, their customers can restore lost data quickly and easily.

open in new tab
Compare  ()