Epilogue of Lenovo’s « Superfishgate »
You’ve probably followed the extensive news coverage of “Superfish”.
This adware, preloaded on the consumer range of Lenovo portable computers, plugs product recommendations into search results, but can hijack connections and open security holes, thus leaving computers vulnerable to malicious attacks. Lenovo published an apology on February 19 and a tool as well procedures to remove Superfish and its certificates were released to the public.
Here are the models on which the software could have been preloaded: Vous avez probablement suivi les échos repris récemment dans la presse concernant “Superfish”.
- G Series: G410, G510, G710, G40-70, G50-70, G40-30, G50-30, G40-45, G50-45, G40-80
- U Series: U330P, U430P, U330Touch, U430Touch, U530Touch
- Y Series: Y430P, Y40-70, Y50-70, Y40-80, Y70-70
- Z Series: Z40-75, Z50-75, Z40-70, Z50-70, Z70-80
- S Series: S310, S410, S40-70, S415, S415Touch, S435, S20-30, S20-30
- Touch Flex Series: Flex2 14D, Flex2 15D, Flex2 14, Flex2 15, Flex2 Pro, Flex 10 MIIX Series: MIIX2-8, MIIX2-10, MIIX2-11, MIIX 3 1030
- YOGA Series: YOGA2Pro-13, YOGA2-13, YOGA2-11, YOGA3 Pro
- E Series: E10-30 Edge Series: Edge 15
Needless to mention that Lenovo has stopped preloading Superfish from January 2015.