ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Delete the Smelly Superfish App From Your Computer

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

First and foremost, if you’re using Superfish on any of your devices, stop. In fact, even if you’re not using it, if Superfish is simply installed on your computer, it still poses a threat. The threat was discovered by Errata Security, and they say that the app is capable of giving hackers access to a user’s encrypted Web data, which includes fun stuff like online passwords.

Lenovo is apologetic of their mestep and they disabled Superfish on systems that had the app as soon as they got the grim news. While it’s good that Lenovo is fessing up to their mistake and taking action like this, if you’ve got Superfish on your computer, you will need to meet them halfway and remove the app from your device.

Normally, you would be able to remove a threat like this by simply uninstalling the app from the Windows Control Panel. To do this, simply go to to Windows Control Panel > Programs > Uninstall a Program > locate Superfish on the list of programs > select it > and click Uninstall.

However, this isn’t your run-in-the-mill app that can be uninstalled so easily. For Lenovo users, Superfish comes preinstalled, which means it’s categorized as bloatware. If you’ve ever tried to remove bloatware, then you know how tricky it can be (a program like AOL is an infamous example of hard-to-delete bloatware). We would like to point out that when a new computer is purchased directly through ClearView IT, we make sure to remove bloatware that your business doesn’t need, which would bypass a risk like the one presented by the preinstalled-and-unnecessary-to-business Superfish app.

In order to delete all traces of the Superfish app from your computer, Lenovo has just released a downloadable tool along with detailed instructions that’s available on their official support website.

After using this tool, your computer should be completely rid of Superfish. That’s great, but you’ve still got some work to do. In security-compromising situations like this, you will want to run a virus scan with up-to-date virus definitions. In fact, don’t hesitate to run a complete scan on your system any time you smell something fishy.

Another preventive security measure is to change all the passwords associated with the accounts accessed from your machine that had Superfish on it. We understand that doing this may be a bit of a hassle, but this is one case where “better safe than sorry” definitely applies. In fact, we recommend that you get in the habit of cycling out your online passwords every few months. It’s a surefire way to stay ahead of the hackers, especially in today’s digital environment which is ripe for the password pickin.’

For the sake of your company’s network security, it’s crucial that you remove Superfish from your systems. Need assistance making sure the Superfish app is completely removed? ClearView IT can remove malicious programs, apply security patches, run virus scans, monitor a firewall, and much more in order to protect your company’s data. For a free network assessment of your company’s security, call us today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Managed Service Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Data Management Managed Service Provider Government Saving Money Operating System Artificial Intelligence Gadgets Managed IT services Networking Windows Workplace Strategy Business Technology Remote Blockchain Bandwidth Encryption Server Information App Mobile Device Management Virtualization WiFi Spam Information Technology Employee/Employer Relationship History Budget Gmail Office Two-factor Authentication Office 365 Apple Cybercrime Health Conferencing Wi-Fi Access Control Analytics Big Data Data Security BDR Hacker Document Management IT Management Training Employer-Employee Relationship Compliance Save Money Voice over Internet Protocol Help Desk Remote Computing Patch Management Hacking Vendor Cost Management Remote Monitoring Money Legal Customer Service Unified Threat Management Firewall Search... Data storage Best Practice Data loss Augmented Reality Word Retail IBM Alert Website Hiring/Firing BYOD Mobile Office Outlook Password Applications Computing Managed Services Vendor Management Hard Drive Vulnerabilities Project Management Law Enforcement Mobile Computing End of Support Websites Printer Meetings Marketing Mobility Sports Windows 11 Social Running Cable SaaS DDoS Google Maps Scam Storage iPhone Travel Education Virtual Reality Cortana Social Engineering VPN Content Filtering Cryptocurrency Black Market Cleaning Update Router User Remote Workers Robot Data Breach Windows 7 The Internet of Things YouTube Free Resource Paperless Office Antivirus Chrome How To Maintenance Laptop Monitoring Twitter Healthcare Computer Care Saving Time Microchip Presentation Downloads Flexibility Specifications IT Consultant Virtual Desktop Vulnerability Employees Computers Experience Bitcoin Software as a Service Avoiding Downtime Telephone Hack Identity Theft Customer Relationship Management Data Protection Holidays Notifications Co-Managed IT Unified Communications Entertainment Cooperation Disaster Excel Google Docs Bluetooth Video Conferencing Distributed Denial of Service Virtual Machines Office Tips Memory Computer Repair Lithium-ion battery Private Cloud Tech Terms Professional Services Virtual Assistant Managed IT HIPAA Processors Digital Politics Settings Machine Learning Taxes Managed Services Provider Processor Virtual Private Network Solid State Drive Current Events Physical Security Chromebook Wireless Technology Drones eWaste Solutions Automobile Multi-factor Authentication PowerPoint Images 101 Integration Administration Downtime How To Safety Start Menu Display Trend Micro Wireless Headphones Microsoft Excel Vendor Mangement AI Business Cards Smart Technology Digital Security Cameras Samsung Electronic Health Records Tech Transportation Going Green Error In Internet of Things Phone System Uninterrupted Power Supply Webcam Wasting Time eCommerce Bookmark Modem Hacks Network Congestion Business Mangement Piracy Writing Videos Tablets Surveillance Term Download Reliable Computing Managing Costs HTML Supercomputer Browsers SSID Nanotechnology Google Calendar Staffing Software License Supply Chain Computer Accessories Virus Media IP Address Development Google Play Employer/Employee Relationships Upload Scalability Motion Sickness Virtual Machine Social Network Administrator Text Messaging Proactive IT Google Drive Reviews Optimization Data Analysis Screen Reader Bring Your Own Device Comparison Mobile Technology Workplace 2FA Security Cameras Teamwork Trends Hypervisor Customer Resource management Devices Knowledge Music Corporate Profile Data Storage Telephony Shopping Competition Employer Employee Relationship Fileless Malware Medical IT Television Recovery Tip of the week Company Culture Scams Paperless Cabling SQL Server Gamification G Suite Licensing Telephone System Botnet LiFi Regulations Tablet PCI DSS Entrepreneur VoIP Gig Economy Application Tracking Humor Directions Backup and Disaster Recovery Rental Service Troubleshooting Mouse Documents Micrsooft Desktop Flash Cables Business Communications Internet Service Provider Business Intelligence Azure Content Web Server Managed IT Service Electronic Medical Records Accountants Telephone Systems Business Growth Regulations Compliance Digital Payment Memes Database SharePoint Securty Point of Sale Human Resources Domains Worker Net Neutrality Health IT Equifax Banking Google Wallet Access Financial Data Shortcuts Time Management Risk Management Public Cloud IT Tactics Messenger Business Owner Hard Drive Disposal Deep Learning Google Apps Username Startup Business Metrics Audit Freedom of Information Hosted Solution Spyware Telework Be Proactive Smartwatch Public Speaking File Sharing Communitications Navigation Microsoft 365 Addiction Books email scam Streaming Media Mobile Security Language Redundancy Society Procurement User Tip Legislation News Cache FinTech Keyboard Monitors Workplace Strategies Unified Threat Management CES Hard Drives Visible Light Communication Workers IT Assessment Evernote Network Management Reading Inbound Marketing Windows 8 Supply Chain Management intranet Value CCTV Cyber security Proxy Server Emails Printing Wireless Fake News Organization Shortcut Computing Infrastructure Displays Touchscreen Heating/Cooling Advertising Smart Devices Environment Service Level Agreement Relocation Management Electronic Payment Windows XP Device security Work/Life Balance Emergency Tech Support Remote Working Social Networking Computer Malfunction

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?