PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Lenovo Quietly Deletes That Bit About ‘No Security Concerns’ To Superfish… While Superfish Says ‘No Consumers Vulnerable’

Posted on February 20, 2015June 30, 2025 by Dissent

Mike Masnick writes:

Wednesday night, the security world blew up with the news (which had actually been out there for a while), that the adware/malware Superfish that Lenovo had been installing by default on many laptops included a massive and dangerous security vulnerability by installing its own, self-signed root HTTPS certificate, and then basically mounting a man in the middle attack on every single HTTPS connection — and doing so with an easily hacked certificate, creating a giant vulnerability for anyone owning one of those laptops. We were shocked at the tone-deafness of Lenovo’s initial response, which didn’t even name which laptops Superfish was installed on, and made this blatantly bullshit statement:

We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns.However, within hours, Lenovo had quietly updated its statement to remove that line. The company is now also (finally) admitting which laptops were infected and put together a page about how to remove the software and the rogue certificate. That’s better, but Lenovo should at least apologize, which it has not done, and admit that it was completely full of shit in insisting that there was no security concern.

Read more on TechDirt.

Related posts:

  • How to Remove Superfish Adware From Your Lenovo Computer
  • CT Attorney General Jepsen Opens Inquiry into Lenovo, Superfish Privacy and Security Concerns
Category: Business

Post navigation

← How Spies Stole the Keys to the Encryption Castle
Digital-Security Firm Gemalto Probes Alleged U.S., U.K. Hack — Update →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas
  • DHS Gives Local Cops a Facial Recognition App To Find Immigrants
  • Phone location data of top EU officials for sale, report finds
  • DHS proposes biometrics expansion for immigrants, dropping age restrictions and requiring biometrics from some US citizens
  • Sling TV settles with California for allegedly violating state consumer privacy law
  • Massive Great Firewall Leak Exposes 500GB of Censorship Data

RSS Recent Posts at DataBreaches.net

  • Pro-Russian hackers target Belgian telecom websites in DDoS attack
  • Nevada Refused to Pay Cyberattack Ransom as Systems Sat Compromised for Months
  • Journalists going solo on Substack at risk from hackers
  • Kr: Investigation shows KT concealed malware infections, security failures leading to hacking breach
  • Hackers defraud multiple lawmakers, a Pakistan Senate committee told
©2025 PogoWasRight.org. All rights reserved.