• Anonymous Matthew Ghali
    10 Mar 2015 7:48 PM
    #

    Your article suggests that exploiting Superfish requires an active MITM in traffic path. THIS IS NOT TRUE. Mass exploitation is possible using a self signed cert with the target domain name as a SAN. Your characterization of the threat is dangerous and leads people to believe the bar for exploitation is much higher than it actually is!

  • Anonymous Bob Thekelpie
    11 Mar 2015 2:46 AM
    #

    ^^ What that guy said.. i mean he sounds geeky so it must be true!

  • Anonymous jorf
    11 Mar 2015 5:24 AM
    #

    Re Matthew, from the article:
    "or register a similar domain to the intended target and convince the user to visit it"

  • Anonymous Anne
    11 Mar 2015 6:26 AM
    #

    Can you explain why a lot of people got offered KB890830 BOTH out of band (last weekend, 7 March) AND as an optional update?

  • Anonymous Michael Cherry
    11 Mar 2015 3:50 PM
    #

    Clean up is nice, but as with all Malware, isn't prevention just as important. Doesn't Microsoft play a role in the installation of such software by OEMs, by not enabling and enforcing programs and policies similar to those used by the Microsoft Store's signature program to ensure customers get an OS image installed on the computer that only has tested and certified applications that the customer needs? Then such clean-ups might not be necessary.