Superfish: How To Get Unhooked From Lenovo’s Dangerous Adware

first_imgyael grauer A Web Developer’s New Best Friend is the AI Wai… Have a recent Lenovo laptop? You may also have been netted by Superfish, an insidious little ad-insertion program that sidesteps ordinary security measures in ways that could expose your personal or financial information to unsavory characters.Where Superfish Swims And What It EatsSuperfish has been installed on select Lenovo computers since at least 2014, and does a number of nasty things. It can alter non-encrypted traffic—i.e., visits to all websites that aren’t protected by HTTPS encryption (that green padlock in Chrome)—by injecting JavaScript that displays affiliated ads on unsuspecting websites. That’s annoying because it can cause problems on those sites, though it’s not necessarily dangerous.But Superfish can also apparently spy on encrypted traffic, such as your visits to banking sites, email or social media. It does this by installing its own rogue root certificate in Windows. This allows the software to falsely represent itself as a trusted authority for every website you visit, even though its certificate has been self-signed and is controlled by Superfish. Google security engineer Chris Palmer was the first to notice the implications.See also: Why Google Wants To Padlock The Web“This allows Superfish to intercept an encrypted SSL connection, decrypt it, then re-encrypt it again,” writes Errata Security CEO Robert Graham. As a result, Superfish is effectively conducting what security pros call a “man-in-the-middle attack,” in which a malicious party eavesdrops on supposedly trusted communications, and can even alter transmitted information on the fly. As a result, it could have access to your bank account, your email and other sensitive data.Making matters worse, Superfish apparently does its spying in such spectacularly clumsy fashion that other hackers could also exploit affected users. Technically, Superfish uses the same private encryption key for each Lenovo machine. “This means that hackers at your local cafe WiFi hotspot, or the NSA eavesdropping on the Internet, can use that private key to likewise intercept all [encrypted] connections from Superfish users,” writes Graham, who cracked the cryptographic key and extracted the certificate.Throwing Superfish BackAlthough many virus scans flag Superfish as spyware, they don’t disable the rogue root certificate, which means your machine could still be vulnerable to hacking. Lenovo has listed models that may be affected, and says that it stopped preloading the adware in January and will not preload it in the future. (It has published instructions for removing the app, although they don’t include removing the malicious certificate.)You can find out if your computer is infected using a test site created by Italian security consultant Filippo Valsorda at, using either Chrome or Internet Explorer. (Firefox behaves a little differently.)If you are affected, Valsorda’s cleanup instructions are the best place to start. To summarize:Uninstall Superfish via the Control Panel. Look for “Superfish Inc VisualDiscovery”Then it’s time to uninstall the certificate from Windows. First open the Windows certificate manager. You can search for “certmgr.msc,” right-click it and choose the option “Run as administrator”Click “Trusted Root Certificate Authorities” and select “Certificates”Scroll to the “Superfish, Inc.” certificateRight-click it and select “delete”Valsorda also includes directions for deleting the certificate from Firefox, which might not be necessary. You can also check the site to make sure your computer is no longer infected, although it’s a little counter-intuitive. If you get a certificate error message on loading the site, you’re safe.Photo by OakleyOriginals Related Posts Why Tech Companies Need Simpler Terms of Servic…center_img Top Reasons to Go With Managed WordPress Hosting 8 Best WordPress Hosting Solutions on the Market Tags:#Chris Palmer#Errata Security#Filippo Valsorda#hacking#Lenovo#malware#Robert Graham#superfish last_img read more

Samsung Galaxy Note 5 could come with 4K AMOLED display: Reports

first_imgBuzz hasit that the upcoming iteration of Samsung’s Galaxy Note (the Samsung GalaxyNote 5, to be precise) could boast of 4K high resolution display. A new reportby Phone Arena suggests that Samsung is planning to begin mass-production of a 5.9-inchUltra HD (4K) Super AMOLED display with a 700ppi pixel density by August nextyear. The said time frame is in line with the company’s annual Note phabletrelease event (IFA expo in September 2015, as per tradition). To sum it up, thealleged 5.9-inch UHD display with a 2160×3840 pixels resolution could welleventually come to Note 5 upon release.Samsung hadearlier indicated at its Semiconductor and Display Technology Roadmap workshop thatit was working on a QHD (2K) Super AMOLED mobile display panel boasting of560ppi pixel density. Motorola’s new Droid Turbo or Moto Maxx features the samedisplay. Ever since, rumours have been doing the rounds that Samsung has been workingon a UHD (4K) display, with a 2160×3480 pixel (4K) resolution and 860ppi pixeldensity. There is however no word from Samsung over the whole matter.Samsungrecently launched the Galaxy Note 4 phablet. The device features a 5.7 inches QHDSuper AMOLED capacitive touchscreen with a 1440 x 2560 pixels resolution. It ispowered by a 2.7GHz  quad-core QualcommSnapdragon 805 processor coupled with 3GB of RAM. It comes with  32GB of internal storage expandable up to64GB via micro-SD. It sports a 16MP rear camera and a 3.7MP front-facingcamera.last_img read more