|Superfish 2.0: now Dell is breaking HTTPS|
|By Thom Holwerda on 2015-11-27 21:35:44|
Earlier this year it was revealed that Lenovo was shipping computers preloaded with software called Superfish, which installed its own HTTPS root certificate on affected computers. That in and of itself wouldn't be so bad, except Superfish's certificates all used the same private key. That meant all the affected computers were vulnerable to a "man in the middle" attack in which an attacker could use that private key to eavesdrop on users' encrypted connections to websites, and even impersonate other websites.
Now it appears that Dell has done the same thing, shipping laptops pre-installed with an HTTPS root certificate issued by Dell, known as eDellRoot. The certificate could allow malicious software or an attacker to impersonate Google, your bank, or any other website. It could also allow an attacker to install malicious code that has a valid signature, bypassing Windows security controls. The security team for the Chrome browser appears to have already revoked the certificate. People can test if their computer is affected by the bogus certificate by following this link.
Did you buy a Dell computer during your Black Friday shopping thing over there in the US? Might want to look it over before handing it your loved one.
Alternatively, just buy a Mac and don't deal with this nonsense.
- How China used a tiny chip to infiltrate US companies - 2018-10-04
- Lenovo: Companies working in China install local backdoors - 2018-09-19
- Dozens of iOS, Android apps secretly share location data - 2018-09-10
- US, others ask companies to build backdoors into encryption - 2018-09-06
- More related articles