• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Lenovo caught installing adware on new computers

makapaaa

Alfrescian (Inf)
Asset
[h=1]LENOVO CAUGHT INSTALLING ADWARE ON NEW COMPUTERS[/h]
Post date:
20 Feb 2015 - 11:07am








It looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time.
The adware, named Superfish, is reportedly installed on a number of Lenovo’s consumer laptops out of the box. The software injects third-party ads on Google searches and websites without the user’s permission.
medium.jpeg

Superfish appears to affect Internet Explorer and Google Chrome on these Lenovo computers.
A Lenovo community administrator, Mark Hopkins, wrote in late January that the software would be temporarily removed from current systems after irate users complained of popups and other unwanted behavior:
We have temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues. As for units already in market, we have requested that Superfish auto-update a fix that addresses these issues.
Hopkins defended the adware, saying that it “helps users find and discover products visually” and “instantly analyzes images on the web and presents identical and similar product offers that may have lower prices.”
He also says that users can refuse the terms and conditions when setting up their laptop, which means the software will be disabled. It doesn’t sound that straight-forward, however.

Other users are reporting that the adware actually installs its own self-signed certificate authority which effectively allows the software to snoop on secure connections, like banking websites as pictured in action below.
This is a malicious technique commonly known as a man-in-the middle attack, where the certificate allows the software to decrypt secure requests, yet Lenovo appears to be shipping this software with some of its products out of the box.
If this is true — we’ve only seen screenshots so far — Superfish could be far more dangerous than just inserting advertising.

Superfish is identified by antivirus products as adware and advised to be removed. One user created a video that details how to remove the software manually, for those that are affected.
Even though Hopkins says the company has stopped installing the software on computers, it appears that’s only “temporary” until the company behind the software makes some tweaks to stop pop-ups.
Reports of Superfish being pre-loaded on Lenovo computers have appeared on forums as early as mid-2014.
If this is as widespread as it appears to be, the news is not good for Lenovo computer owners. If you own a Lenovo machine, let us know in the comments if you find the Superfish software on your machine.
We’ve contacted Lenovo for comment on the Superfish software and will update when we hear back.






Read Next: Lenovo’s bundled adware also comes with a worrying security hole
Update: Mozilla Firefox does not appear to be affected by the SSL man-in-the-middle issue, because it maintains its own certificate store.
Update 2: Lenovo contacted us with the below statement and says that it has disabled the Superfish software and will not bundle it in the future. The company did not, however, respond to the root security certificate flaw and does not appear to have fixed it.
“Superfish was previously included on some consumer notebook products shipped in a short window between September and December to help customers potentially discover interesting products while shopping. However, user feedback was not positive, and we responded quickly and decisively:
1) Superfish has completely disabled server side interactions (since January) on all Lenovo products so that the product is no longer active. This disables Superfish for all products in market.
2) Lenovo stopped preloading the software in January.
3) We will not preload this software in the future.
We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns. But we know that users reacted to this issue with concern, and so we have taken direct action to stop shipping any products with this software. We will continue to review what we do and how we do it in order to ensure we put our user needs, experience and priorities first.
To be clear, Superfish technology is purely based on contextual/image and not behavioral. It does not profile nor monitor user behavior. It does not record user information. It does not know who the user is. Users are not tracked nor re-targeted. Every session is independent. Users are given a choice whether or not to use the product. The relationship with Superfish is not financially significant; our goal was to enhance the experience for users. We recognize that the software did not meet that goal and have acted quickly and decisively.
We are providing support on our forums for any user with concerns. Our goal is to find technologies that best serve users. In this case, we have responded quickly to negative feedback, and taken decisive actions to ensure that we address these concerns. If users still wish to take further action, detail information is available at http://forums.lenovo.com.”
Update 3: A developer has created a website that helps Lenovo owners quickly check if they’re affected by the root security certificate and offers suggestions on how to fix if they are.
Update 4: Lenovo has released detailed instructions on how to fully remove Superfish from affected systems.

*Article first appeared on http://thenextweb.com/insider/2015/02/19/lenovo-caught-installing-adware...
 

eErotica69

Alfrescian (InfP)
Generous Asset
KNN almost every Chinese app I install sure got Adware, or change my homepage and setting!
 

Mirage

Alfrescian
Loyal


Lenovo stops sales of laptops with pre-installed ‘Superfish’ adware after customer uproar

Mainland personal computer giant says it has stopped shipping laptops with controversial Superfish adware and is now offering online support

PUBLISHED : Friday, 20 February, 2015, 2:49pm
UPDATED : Saturday, 21 February, 2015, 1:39am

Bien Perez [email protected]

_tok807_31113207.jpg


Lenovo has stopped selling products with pre-installed adware. Photo: Reuters

Mainland computer giant Lenovo has moved to quash a growing controversy over adware pre-installed on millions of its laptops after experts declared it a serious security threat.

Lenovo, the world's largest supplier of personal computers, said it stopped shipping products with the Superfish software last month and was now offering technical support online with step-by-step instructions on how to uninstall it.

The company, which has its headquarters in Beijing and operations in more than 160 countries, vowed not to preload the software on any product in the future. "We know that users reacted to this issue with concern, and so we have taken direct action to stop shipping any products with this software," it said.

"We will continue to review what we do and how we do it in order to ensure we put our user needs, experience and priorities first."

The Superfish visual discovery adware pushes third-party advertisements into Google searches and websites without the computer user's permission.

The technology was adopted by Lenovo under a partnership with a US-based software start-up, Superfish, that pioneered visual search technology.

"The relationship with Superfish is not financially significant; our goal was to enhance the experience for users," Lenovo said. "We recognise the software did not meet that goal and have acted quickly and decisively."

Global personal computer shipments last year totalled 308.6 million units, with Lenovo accounting for 59.2 million, according to research firm IDC.

3871b7d067462b727a28ec192d6c37c6.jpg


Lenovo's MIIX 2 laptop model

Marc Rogers, the principal security researcher at US firm CloudFlare, said in a blog post that Superfish used a "man-in-the-middle" attack to break secure connections on affected laptops to access sensitive data and inject advertising.

"As if that wasn't bad enough, they installed a weak [security] certificate into the system in a way that means affected users cannot trust any secure connections they make to any site," Rogers said. "In this current climate of rising cybercrime, if you can't trust your hardware manufacturer, you are in a very difficult position."

Lenovo said Superfish was not installed on its premium, Thinkpad-brand business notebook computers. The technology was also never preloaded on its desktop computers, smartphones or tablets.

According to Lenovo, the affected products include certain models under its G, U, Y, Z, S, E, Miix, Flex and Yoga-series laptops shipped between September and December last year.

In a blog post, Errata Security chief executive Robert Graham said the Superfish software was "designed to intercept all encrypted connections, things it shouldn't be able to see".

"It does this in a poor way that it leaves the system open to hackers or NSA-style spies. For example, it can spy on your private bank connections," Graham said.

He said the earliest-known Lenovo user postings about the company's add-on software appeared in June. Lenovo shipped more than 16 million laptop and desktop machines in the fourth quarter of last year, with laptops accounting for 52.1 per cent of its revenue.

Chris Palmer, a software security engineer at Google, was credited with noticing the implications of the adware after buying a Lenovo laptop in San Francisco.

Lenovo said Superfish technology did not profile or monitor user behaviour.

Rogers, however, said Superfish's software had quite a reputation. "It is a notorious piece of adware, malicious advertising software," he said.


 

virus

Alfrescian
Loyal
Those Taiwanese have been doing it all along.

the FAP also have been doing this. using WhatTheFish Apps that is tagged to every news and TV drama, esp in recent days when they try to promote the LocalFarkSize.
 
Top