In case you are unaware, Lenovo has been shipping some of its consumer notebooks with a preinstalled adware called Superfish. This software makes it possible for hackers to steal sensitive user data like passwords, banking information, etc. Scroll down to know more about this adware and how to remove it from your PC.
So what is Superfish?
Superfish is a software that comes preinstalled in some Lenovo notebooks. It was designed to help enhance the online shopping experience of consumers by letting them discover products visually.
What does Superfish do?
Superfish works by installing its own fake certificate on the user’s machine, and substituting it for the encrypting certificates used by many sites like Google, Facebook, any banking or online shopping site and others. So, by bypassing the secure connection, the adware intends to quietly insert more ads into secure HTTPS pages.
How is this bad for users?
Because Superfish bypasses secure servers, it can easily allow hackers exploit its fake certificate and steal sensitive user data such as banking information, email, phone numbers, etc. So, if a user logs in to their online banking account from a laptop that has Superfish in it, their login credentials can be stolen by an attacker. Likewise, if they access emails, an attacker can read their mail and steal their passwords.
So what should Lenovo users do?
As nasty as the Superfish adware might sound, it can be easily removed with the help of a few simple steps. So, if you are using a Lenovo laptop, then here’s a step-by-step guide to remove Superfish:
Merely removing Superfish is not enough. You also need to get rid of the certificate that it has installed on your PC. Here’s how to do it:
You can also download a PDF of this step-by-step instruction. Lenovo has also released an automatic removal tool for Superfish – https://support.lenovo.com/us/en/product_security/superfish_uninstall
Lenovo has also released an official statement on this entire matter. A list of Lenovo models that may have Superfish in them is also available. Read about it here.