The pun was too tempting, but don't take it too seriously even though it's relatively similar. In short, Dell installs a long-lived, root certificate on their machines with a private key that is now compromised (because they didn't exactly protect it too well). This certificate, and the compromised private key, can be used to sign secure connections without needing to be verified by a Certificate Authority. In other words, it adds a huge level of unwarranted trust to phishing and man-in-the-middle attacks.
Dell has not really made any public comment on this issue yet. I don't really count the tweet from Dell Cares, because customer support is a terrible source for basically any breaking news. It's best to wait until Dell brings out an official statement through typical PR channels before assuming what their position is. Regardless of what they say, of course, your security will be heavily reduced until the certificate and eDell plug-in are removed from your device.
I'm really just wondering if Dell will somehow apologize, or stick to their guns.