Xiaomi truth has installed malicious code in Xiaomi Mi4?
This is not the first time, an originating product from China is accused of malicious and security issues.
Security firm Bluebox has discovered a few malicious applications that have been pre-installed on Xiaomi Mi 4, they are a Google application aimed at advertising and trojans, helping hackers to control the phone remotely. .
In addition, security experts of Bluebox also discovered many security holes that allow hackers to exploit on Xiaomi Mi 4.
Andrew Blaich, head of Bluebox's security analysis team, said Xiaomi Mi 4 uses an Android version without Google certification. In fact, Xiaomi Mi 4 uses the MIUI platform developed by Xiaomi based on the Android platform.
Xiaomi later denied any allegations related to their products. The company believes that the device that Bluebox uses in the analysis may not be a genuine product, so Bluebox cannot conclude that Xiaomi is the mastermind of the pre-installation of these malicious code. However, Bluebox said that Xiaomi's denial is a disclaimer.
In July 2014, Xiaomi's Redmi Note smartphone was also discovered secret signs that sent user information to Xiaomi's server in China. Xiaomi later denied this and said it was essentially a feature on its products and then had to release a software upgrade to cancel this functionality.
You should read it
- 118 Xiaomi devices upgraded to MIUI 13
- Xiaomi launches Redmi Note 8T: Snapdragon 665 chip, 4,000 mAh battery with fast charging 18W, priced at $ 220
- Xiaomi launched the Mi Note 10 / Note 10 Pro, the world's first 108MP camera
- Looking back: The Xiaomi Redmi Note 3 - a cheap phone into a global best-seller
- Review Redmi Note 9: The new low-cost model?
- Redmi Note 9S launched in Vietnam: Snapdragon 720G, 48MP camera, 5020mAh battery
- Xiaomi spoke up about the phone spy question
- Design, configuration and price of Xiaomi Redmi Note 8 and Note 8 Pro
May be interested
- Revealing a new variant of computer virus can destroy itself when detectedaccording to security researchers at cisco, a new type of malware called rombertik has just been discovered that can destroy itself important data stored in windows system files on the master boot record.
- Rombertik malware appears to attack hard drive and delete MBRthe battle between cybercrime and security has entered a new phase with the emergence of rombertik, a malware (malware) capable of capturing packets to collect personal data while browsing the web simultaneously. will attack and overwrite the mbr (master boot record) of the computer hard drive to remove traces if analyzed by security software
- Appeared super risk of computer underground GPU exploitationgraphics processing chips (gpus) are known to have much higher computing power than the main processor chips (cpus). if used for good purposes, the gpu will be very beneficial. but if bad guys take advantage of gpu, the consequences will be very unpredictable.
- Mac sticks with serious security holesaccording to ars technica, security expert pedro vilaca found a mac os x vulnerability that allowed hackers to take over the mac after exiting sleep. this vulnerability will affect all macs released before mid-2014
- Remove CCleaner's annoying messages in 2 stepscurrently, ccleaner is one of the most popular system cleaning tools, increasing the performance of computers. however, one thing that annoys users is that ccleaner often sends notifications during use. so today, we will share with you how to remove those annoying messages in the article below.
- Is antivirus software really slowing down your computer?antivirus software helps protect your computer from virus intrusion. but do these anti-virus software really slow down your computer? please refer to the following article of network administrator.