{"id":3543,"date":"2015-02-20T10:14:22","date_gmt":"2015-02-20T18:14:22","guid":{"rendered":"http:\/\/3d.coldstreams.com\/?p=3543"},"modified":"2015-02-20T10:14:22","modified_gmt":"2015-02-20T18:14:22","slug":"lenovo-security-fault-called-reckless","status":"publish","type":"post","link":"https:\/\/coldstreams.com\/3d\/2015\/02\/20\/lenovo-security-fault-called-reckless\/","title":{"rendered":"Lenovo security fault called reckless"},"content":{"rendered":"<p>Lenovo pre-installed malware on millions of computers that broke https security for months &#8211; and then initially denied the problem. This vulnerability means systems used to log in to financial, work, online sales and other sites were compromised.<\/p>\n<blockquote><p>Installing Superfish is one of the most irresponsible mistakes an established tech company has ever made. Reckless, careless, and appalling don\u2019t even come close to covering it.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.slate.com\/articles\/technology\/bitwise\/2015\/02\/lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html\">Lenovo Superfish scandal: Why it\u2019s one of the worst consumer computing screw-ups ever.<\/a><\/p>\n<ul>\n<li>If you are using a Lenovo computer purchased last year, you need check for the presence of Superfish by going <a href=\"https:\/\/filippo.io\/Badfish\/\">to this page and reading the result<\/a>.<\/li>\n<li>Lenovo&#8217;s manual <a href=\"http:\/\/support.lenovo.com\/us\/en\/product_security\/superfish\">spyware removal instructions<\/a>.<\/li>\n<li>As of this morning, Microsoft has updated Windows Defender to remove the Superfish digital certificate that causes the security failure in Lenovo computers. Update Windows Defender and scan your system.<\/li>\n<li>CHANGE\u00a0 YOUR PASSWORDS at secure web sites. You need to especially change your passwords at critical information web sites such as your financial accounts, health care records accounts, and online purchasing accounts as your account information had the potential of being compromised.<\/li>\n<\/ul>\n<h6 class=\"zemanta-related-title\" style=\"font-size: 1em;\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul zemanta-article-ul-image\" style=\"margin: 0; padding: 0; overflow: hidden;\">\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/blog.cryptographyengineering.com\/2015\/02\/how-to-paint-yourself-into-corner.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"\/\/i.zemanta.com\/328684876_80_80.jpg\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/blog.cryptographyengineering.com\/2015\/02\/how-to-paint-yourself-into-corner.html\" target=\"_blank\" rel=\"noopener noreferrer\">How to paint yourself into a corner (Lenovo edition)<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/securitywatch.pcmag.com\/microsoft-windows\/331467-windows-10-what-s-new-in-security\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"\/\/i.zemanta.com\/324519668_80_80.jpg\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/securitywatch.pcmag.com\/microsoft-windows\/331467-windows-10-what-s-new-in-security\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 10: What&#8217;s New in Security?<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/meta.ath0.com\/2015\/02\/19\/lenovo-vs-superfish\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"\/\/i.zemanta.com\/noimg_0_80_80.jpg\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/meta.ath0.com\/2015\/02\/19\/lenovo-vs-superfish\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lenovo vs Superfish<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Lenovo pre-installed malware on millions of computers that broke https security for months &#8211; and then initially denied the problem. This vulnerability means systems used to log in to financial, work, online sales and other sites were compromised. Installing Superfish is one of the most irresponsible mistakes an established tech company has ever made. Reckless, &hellip; <a href=\"https:\/\/coldstreams.com\/3d\/2015\/02\/20\/lenovo-security-fault-called-reckless\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Lenovo security fault called reckless<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,9],"tags":[],"class_list":["post-3543","post","type-post","status-publish","format-standard","hentry","category-business","category-editing"],"_links":{"self":[{"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/posts\/3543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/comments?post=3543"}],"version-history":[{"count":0,"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/posts\/3543\/revisions"}],"wp:attachment":[{"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/media?parent=3543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/categories?post=3543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coldstreams.com\/3d\/wp-json\/wp\/v2\/tags?post=3543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}