More good news.
Thanks to kryo, I went PrivDog hunting and lo and behold it fell into my lap - thanks to gHacks.
PrivDog will install a self signed root certificate on your system enabling mitm attacks.
So, here's the link with how to find if it's on your system...seems certain Comodo products shipped with it.
Anyway, the test site for Superfish was giving "false positives"...and PrivDog seems to be the reason.
The latest version of Comodo Dragon ships with PrivDog, but doesn't install a Root Certificate.
PrivDog is an "Ad switcher" like Superfish.
You should uninstall PrivDog, and the software it comes with and check for the root certificate this way:
- Tap on the Windows-key, type mmc.exe and hit enter.
- Go to File -> Add/Remove Snap-in
- Pick Certificates, click Add
- Pick Computer Account, click Next
- Pick Local Computer, click Finish
- Click OK
- Look under Trusted Root Certification Authorities -> Certificates
Source:
http://www.ghacks.net/2015/02/23/privdog-is-superfish-all-over-again/?_m=3n%2e0038%2e1528%2ehj0ao01hy5%2e1l02