Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 11 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Superfish CEO says it is "transparent in what our software does"

by The Gurus
February 20, 2015
in Editor's News
Share on FacebookShare on Twitter

Software provider Superfish has said it stands by claims made by Lenovo, that there is nothing malicious about its product.
 
In a statement to sent IT Security Guru, Superfish CEO Adi Pinhas said that the company is standing by the comments made by Lenovo, and confirmed that Superfish has not been active on Lenovo laptops since December.
 
He said: “It is important to note [that] Superfish is completely transparent in what our software does and at no time were consumers vulnerable – we stand by this today. Lenovo will be releasing a statement later today with all of the specifics that clarify that there has been no wrong doing on our end.”
 
The statement from Lenovo claimed that it pre-installed the third-party software Superfish “in our effort to enhance our user experience” and said it is working directly with Superfish and with other industry partners to ensure we address any possible security issues now and in the future.
 
“Superfish technology is purely based on contextual/image and not behavioural,” Lenovo said. “It does not profile nor monitor user behaviour. It does not record user information. It does not know who the user is. Users are not tracked nor re-targeted. Every session is independent. Users are given a choice whether or not to use the product.”
 
However this is still being contested by industry researchers. Marc Rogers, security researcher at Cloudflare, said on Twitter that “it blows my mind that Lenovo are trying to pass the threat from these certificates off as ‘theoretical’ or otherwise diminish the risk”, while blogger Robert Graham said “Lenovo’s statement is a bald face lie. If this program were so great, users would be able to download it themselves”.
 
Adam Winn, manager at OPSWAT, said that it was “shocking” that Lenovo would preinstall software that breaks the SSL trust chain in such a fundamental way, and that with a dedicated following of IT professionals, as evidenced by the ubiquity of Thinkpads in enterprise, there’s no doubt that this incident will come with a heavy hit to Lenovo’s bottom line. He said: “No IT administrator will tolerate a MITM attack on company owned or even BYOD assets.”
 
TK Keanini, CTO of Lancope, said: “I’m happy to see consumers pushing back and demanding greater security out of the box. Unless the market steps up and ask for more secure systems, vendors will keep doing silly and sometimes irresponsible things.
 
“I remember purchasing a laptop for my daughter a few years back and the retailer wanted me to pay extra to remove all the adware and ‘extra’s from the unit. This is not right.  Pay extra so that I can get rid of all the advertising software and programs that slow my experience down?  It is like buying a car and paying extra to remove the ads painted on the

FacebookTweetLinkedIn
Tags: CertificateHTTPSSSLSuperfish
ShareTweet
Previous Post

Intelligence agencies targeted Gemalto to access SIM data and calls

Next Post

Let's add mutability to the things we cannot change

Recent News

Ransomware

Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots

June 9, 2023
code

Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted

June 8, 2023
large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information