Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Remove the Harmful Superfish App Off Your PC

b2ap3_thumbnail_lenovo-superfish_400.jpgOne would assume that software preinstalled on a new PC is secure and has been properly vetted by the manufacturer. This is the case 99 percent of the time, but an exception has recently been discovered with the Superfish app, which came installed on new Lenovo computers sold between September and December of 2014. How can you protect your PC from this fishy security threat?

First off, if you have Superfish on any of your devices, whether it be a new Lenovo computer or other, you should cease using the app. The shopping-search app has been deemed to be a security threat by Errata Security, reporting that it’s capable of providing hackers with a user’s encrypted Web data, the likes of which include online passwords.

This risk applies to you whether you actually use the Superfish app or not. Just the app’s presence on your device is enough to warrant action for its removal. As soon as Lenovo learned of the threat, they disabled the app on systems that already had it installed. Although, you will still need to take action in the aiding of the removal process.

One way to remove Superfish from your PC is to go to Windows Control Panel > Programs > Uninstall a Program. Now, locate Superfish on the list of programs > select it > and click Uninstall.

However, going through the Windows Control Panel like this isn’t enough to remove all traces of Superfish from your computer. If you’ve ever tried before to remove preinstalled software on your PC (known as bloatware), you know from experience that it can be extra difficult to remove--we’re looking at you AOL.

To fully remove all traces of the Superfish app, Lenovo offers users a removal tool and instructions on their support page: http://support.lenovo.com/us/en/product_security/superfish_uninstall

This removal tool is thorough enough to fully rid your device of the threat posed by Superfish, but don’t think that you’re totally in the clear just because you’ve removed the app. You will now want to go into damage control mode and clean up from this super smelly fish. As is the case when learning about any known threat on your computer, it’s a good idea to immediately perform a virus scan, making sure that your anti-virus software has its definitions up to date--better safe than sorry.

An additional security measure that we recommend is to change the passwords for any online account you’ve accessed on the device from before Superfish was installed. This may feel like a bit of an inconvenience, but it’s the best way to protect your sensitive information in the event that a hacker has stolen your password. It should be noted that regularly changing your online passwords is a security best practice, so it’s good to get in the habit of doing this every few months, especially in light of the growing number of unforeseen threats like Superfish which seem to be extra prevalent these days.

One benefit from doing business with a managed services provider like Telesys Voice and Data is that we will remove all the bloatware and other unnecessary applications prior to installing the machine onto your company’s network.

For assistance removing Superfish from your company’s computers, and to take advantage of a free IT assessment to make sure that your network is safe from hidden threats such as this, contact the IT security professionals at Telesys Voice and Data.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Productivity Business Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Productivity Managed Service Provider Data Backup Ransomware Innovation Backup Mobile Devices Business Continuity Outsourced IT Hardware Smartphone Google Android Efficiency Upgrade User Tips Data Recovery Disaster Recovery Social Media Managed IT services Browser Data Communication IT Support Workplace Tips Small Business Business Management Cloud Computing IT Support Managed IT Services Smartphones Data Management App Office Phishing Remote Monitoring Miscellaneous Server Holiday Microsoft Office Internet of Things Paperless Office communications WiFi Office 365 Windows Network Password Facebook Save Money VoIP Encryption Spam Tech Term Passwords Cybersecurity Artificial Intelligence Gmail Big Data Apps Saving Money Hosted Solution Recovery Customer Relationship Management Collaboration Windows 10 Employer-Employee Relationship Document Management Risk Management Apple Unified Threat Management Bandwidth Firewall Robot Money Remote Computing Work/Life Balance Downtime Wi-Fi Managed IT Infrastructure Office Tips Chrome Tip of the week Analytics Vendor Management Compliance Avoiding Downtime Word Hacker Customer Service Mobile Device Management How To Content Filtering Operating System Government Antivirus SaaS Redundancy BYOD Presentation Social Business Growth Data loss Project Management Website BDR Business Technology Outlook Telephone Systems Two-factor Authentication File Sharing Settings Healthcare The Internet of Things Automation Managed Service Going Green Computers Vulnerability Health Alert Help Desk Printing Data storage Hacking Data Security Applications Mobile Computing Computing Tech Support Education Windows 7 IT Management Cybercrime Virtual Reality Training Mobile Device IT solutions Safety Analyitcs Wireless Technology Tablet Upgrades Wireless Automobile Budget Access Control End of Support Mouse Specifications YouTube Unified Communications Legal Laptops Display User LiFi Twitter Retail Politics Monitors Patch Management Travel Solid State Drive Identity Theft Google Drive Scam Best Practice Lithium-ion battery Websites Physical Security Augmented Reality Regulations Business Owner Taxes IBM Running Cable Botnet Marketing VPN Net Neutrality Assessment Samsung Proactive Server Management Licensing Bring Your Own Device Search Virtual Private Network Smart Technology Meetings Consultation Digital Payment Sports Storage Competition Remote Monitoring and Management HIPAA IT service Software as a Service Maintenance Cortana Router Mobile Security Information Technology Computer Care Virtualization Administration Humor Fleet Tracking Mirgation Employees Comparison Error History WannaCry Cryptocurrency Knowledge Cookies Gadgets Break Fix IT Consulting Language Time Management Printer Company Culture Mobile VoIP Troubleshooting Asset Tracking Migration Zero-Day Threat Mobility Black Friday Cabling Web Server Bitcoin Update Staffing Experience Nanotechnology Proactive Maintenance Dark Web Data Breach Computing Infrastructure Phone System Network Management Vulnerabilities 3D Printing Remote Workers Chatbots Backup and Disaster Recovery Cyber Monday Administrator Cameras VoIP Windows 8 Chromebook GPS IoT Processor Data Warehousing Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Geography Unsupported Software Information 5G Identity RMM Entrepreneur flu season Disaster CCTV Digital Emoji Tracking Utility Computing Application Lenovo Microsoft Excel Public Speaking Unified Threat Management Cooperation Downloads Gadget Users Cables Mobile Data Monitoring Hacks Procurement Shortcut Fort Worth Uninterrupted Power Supply Spyware Active Directory Superfish Blockchain business communications systems Staff Multi-Factor Security Wires iPhone Electronic Health Records Current Events Remote Worker flu shot G Suite How To Processors Laptop Cost Management Windows Server Hard Drives Permissions Internet Protocol Flexibility Heating/Cooling Google Calendar Virtual Desktop Professional Services Fort Worth IT Motion Sickness Hard Disk Drive Firefox Supercomputer Halloween Google Docs Hard Drive User Management Refrigeration Networking Fraud MSP VoIP streamlines Operations Cyberattacks Servers Legislation Writing Deep Learning Personal Information Fun Social Networking Virtual Assistant DFW IT Service PowerPoint IT Consultant IT Budget Scary Stories Recycling Batteries business network infrastructure Wearable Technology Bookmarks Machine Learning Social Engineering Computer Repair Motherboard Voice over Internet Protocol Consumers Techology Internet Exlporer Cleaning Notifications Management Remote Work Undo IP Address Favorites Statistics Relocation Software Tips Webcam Alt Codes Electronic Medical Records Google Wallet Mail Merge Distributed Denial of Service Disaster Resistance data services Crowdsourcing Dark Data Enterprise Resource Planning File Management eWaste WPA3 Mobile Office IT Technicians Conferencing Bluetooth Technology Tips IT Sevices Private Cloud Point of Sale Corporate Profile Typing Drones Modem Manufacturing Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Buisness Mobile Telephone Environment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code