PogoWasRight.org

Menu
  • About
  • Privacy
Menu

How to Remove Superfish Adware From Your Lenovo Computer

Posted on February 20, 2015June 30, 2025 by Dissent

Adi Kamdar writes:

We recently learned that PC manufacturer Lenovo is selling computers preinstalled with a dangerous piece of software, called Superfish, that uses a man-in-the-middle attack to break Windows’ encrypted Web connections for the sake of advertising. (Here’s a list of affected products.) Research from EFF’s Decentralized SSL Observatory has seen many thousands of Superfish certificates that have all been signed with the same root certificate, showing that HTTPS security for at least Internet Explorer, Chrome, and Safari for Windows, on all of these Lenovo laptops, is now broken. Firefox users also have the problem, because Superfish also inserts its certificate into the Firefox root store.

This is a serious security issue. For example, shortly after this news became widespread, security researcher Robert Graham was able to extract the certificate from the Superfish adware and quickly cracked the password. With this password, a malicious attacker would be able to intercept encrypted communications on the same network (like at a cafe Wi-Fi hotspot).

To find out if this issue affects you, go to Filippo Valsorda’s Superfish CA test page in Internet Explorer or Chrome first. If you see a “YES,” follow these instructions (courtesy of Valsorda and from Lenovo’s instructions) for removal:

Read more on EFF.

Related posts:

  • CT Attorney General Jepsen Opens Inquiry into Lenovo, Superfish Privacy and Security Concerns
Category: BreachesBusiness

Post navigation

← AU: A group of security guards at Westfield Sydney using surveillance cameras to prey on female shoppers
How Spies Stole the Keys to the Encryption Castle →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal
  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says

RSS Recent Posts at DataBreaches.net

  • Manassas City Public Schools close on Monday due to cyberattack
  • San Joaquin County Superior Court concludes sensitive info leaked in data breach
  • NCCIA arrests man over massive data breach involving millions of Pakistanis
  • Defense Contractors Are Silencing Their Cybersecurity Watchdogs
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
©2025 PogoWasRight.org. All rights reserved.