

Unfortunately, this issue isn’t limited to Google. Those who do are probably using a search engine like DuckDuckGo, rather than Google, anyway. Okay, who cares, right? I mean, sure, there are some potential privacy issues involved there, but in reality, most people don’t care much if someone’s monitoring their searches. This means that Avast has complete control over the connection between the browser and Google, and has the power to intercept – or even modify – any data being transmitted. (I’m guessing the certificate on the affected reader’s system was outdated, and had not been properly updated for some reason.)Īs can be seen from the screenshot, the certificate claims to be for Google, but was not issued by the authority that Google actually uses (GeoTrust Global). On my test system, though, the Avast certificate was trusted. Some testing this morning showed that Avast is replacing Google’s certificate with one of their own. The error message pointed the finger at a certificate issued by a certificate authority named “Avast untrusted CA.” I received an e-mail from a reader yesterday asking why he was getting an error in Chrome complaining that his connection to Google was not private.
#Avast for mac 10.8 software#
No legitimate software would ever behave this way, would it?ĭon’t be too sure. So we shouldn’t be surprised at its misbehavior. Surely this kind of thing could only be done by unethical hackers, right? I mean, Superfish is essentially adware, and in my opinion has now crossed the line into malware territory. It should be immediately obvious that this is a Very Bad Thing. This is what security experts call a “man-in-the-middle attack,” meaning something or someone that interjects itself between two parties attempting to have secured communications. What Superfish has done is replace these certificates with one of its own, which gives the software the ability to intercept any data being sent to or from such a secure site. This protects you from snoops, who cannot see any potentially sensitive data being transmitted. So, when you connect to your bank’s website, for example, a certificate is used to encrypt all data sent between your browser and the bank site.

The lock icon shown by browsers when the user is connecting to an “HTTPS” site is an indication that the connection is being secured, using a form of encryption that relies on an SSL “certificate” issued by a trusted certificate authority. Replacing SSL certificates is a significant security issue. It turns out that the same behavior is being exhibited by software that many people are inclined to trust: Avast’s anti-virus software! The primary issue concerning experts is that Superfish replaced SSL certificates, used for ensuring secure connections on the internet, with its own certificates.

The security community is ablaze with news of Superfish being pre-installed on some Lenovo computers. February 24th, 2015 at 12:47 PM EST, modified
