Xiaomi truth has installed malicious code in Xiaomi Mi4?

This is not the first time, an originating product from China is accused of malicious and security issues.

Xiaomi truth has installed malicious code in Xiaomi Mi4? Picture 1

Security firm Bluebox has discovered a few malicious applications that have been pre-installed on Xiaomi Mi 4, they are a Google application aimed at advertising and trojans, helping hackers to control the phone remotely. .

In addition, security experts of Bluebox also discovered many security holes that allow hackers to exploit on Xiaomi Mi 4.

Andrew Blaich, head of Bluebox's security analysis team, said Xiaomi Mi 4 uses an Android version without Google certification. In fact, Xiaomi Mi 4 uses the MIUI platform developed by Xiaomi based on the Android platform.

Xiaomi later denied any allegations related to their products. The company believes that the device that Bluebox uses in the analysis may not be a genuine product, so Bluebox cannot conclude that Xiaomi is the mastermind of the pre-installation of these malicious code. However, Bluebox said that Xiaomi's denial is a disclaimer.

In July 2014, Xiaomi's Redmi Note smartphone was also discovered secret signs that sent user information to Xiaomi's server in China. Xiaomi later denied this and said it was essentially a feature on its products and then had to release a software upgrade to cancel this functionality.

4 ★ | 1 Vote

May be interested

  • Revealing a new variant of computer virus can destroy itself when detectedPhoto of Revealing a new variant of computer virus can destroy itself when detected
    according to security researchers at cisco, a new type of malware called rombertik has just been discovered that can destroy itself important data stored in windows system files on the master boot record.
  • Rombertik malware appears to attack hard drive and delete MBRPhoto of Rombertik malware appears to attack hard drive and delete MBR
    the battle between cybercrime and security has entered a new phase with the emergence of rombertik, a malware (malware) capable of capturing packets to collect personal data while browsing the web simultaneously. will attack and overwrite the mbr (master boot record) of the computer hard drive to remove traces if analyzed by security software
  • Appeared super risk of computer underground GPU exploitationPhoto of Appeared super risk of computer underground GPU exploitation
    graphics processing chips (gpus) are known to have much higher computing power than the main processor chips (cpus). if used for good purposes, the gpu will be very beneficial. but if bad guys take advantage of gpu, the consequences will be very unpredictable.
  • Mac sticks with serious security holesPhoto of Mac sticks with serious security holes
    according to ars technica, security expert pedro vilaca found a mac os x vulnerability that allowed hackers to take over the mac after exiting sleep. this vulnerability will affect all macs released before mid-2014
  • Remove CCleaner's annoying messages in 2 stepsPhoto of Remove CCleaner's annoying messages in 2 steps
    currently, ccleaner is one of the most popular system cleaning tools, increasing the performance of computers. however, one thing that annoys users is that ccleaner often sends notifications during use. so today, we will share with you how to remove those annoying messages in the article below.
  • Is antivirus software really slowing down your computer?Photo of Is antivirus software really slowing down your computer?
    antivirus software helps protect your computer from virus intrusion. but do these anti-virus software really slow down your computer? please refer to the following article of network administrator.