« Stop!t: The Newest App To Curb Cyberbullying | Huge Facebook Malware Outbreak Infects 110K Users in Two Days » |
Following the discovery of Superfish installed in certain Lenovo laptop and tablet models, some users have found, compiled, and published a list of other apps that also use SSL Decoder or Digestor, the Komodia software development kit (SDK) responsible for granting the said risky app its HTTPS interception functionality.
Unfortunately, some of the apps mentioned were parental control software, which are used by parents and caretakers to safeguard young teens and kids from potential online threats. They are as follows:
We cannot say for now if the above is already an exhaustive list. There might be other similar programs that use the SDK that have yet to be discovered.
For parents and carers, we encourage you to check your home computer and all mobile devices for presence of the applications we mentioned above. You can do that by doing a simple system search, or you can also use this sitethat was specifically created by a security researcher to automatically detect any application on systems with the Komodia SDK.
Once you have confirmed that one or more of the above apps are indeed installed and running, you now need to confirm if they have unrestricted private root certificates. It is important that you remove the certificate/s first before uninstalling the risky apps. You can visit this page and follow steps II and III for instructions on how to do this.
There is no automated way to remove certificates, so please be careful when following procedure. If needed, seek the help of family members who are savvy enough to maneuver within the system while under guidance.
You can refer to this page on our forums for instructions on how to remove the offending apps. Please note that steps to remove them are the same steps to uninstall Superfish.
Form is loading...
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)