Dell has quickly responded to potential manipulation of a new master root certificate, that could have been potentially compromised for a limited # of recent new laptops & PCs 

http://www.eweek.com/security/dell-instructs-users-to-remove-rogue-edellroot-ca.html

Dell installed a root certificate on new machines, in a security faux pas similar to Lenovo’s Superfish. Dell is back-pedaling today after it was revealed that the PC giant has been shipping a number of its laptops with a preinstalled, self-signed root certificate authority called eDellRoot. The impact of this is that users could be left at risk from attackers, potentially enabling information theft.

“The recent situation raised is related to an on-the-box support certificate intended to provide a better, faster and easier customer support experience,” Dell stated. “Unfortunately, the certificate introduced an unintended security vulnerability.” Dell has now publicly posted instructions on how the eDellRoot CA can be removed from users’ systems. Dell also stated that it will be removing the certificate from all Dell systems moving forward.