Galaxy Z Fold 6 dummy poses next to Galaxy Z Fold 5

0
[ad_1]

The Samsung Galaxy Z Fold 6 and Flip 6 are right around the corner. As we’re waiting for the launch event, more and more information keeps dropping. Well, in the latest turn of events, the Galaxy Z Fold 6 dummy popped up, and it’s posing next to the Galaxy Z Fold 5.

The Galaxy Z Fold 6 dummy has been shared by a well-known tipster, and compared to Fold 5

If you check out the image below, you’ll see the two phones side by side. This was shared by Ice Universe, a well-known tipster, so the design of this dummy is probably very accurate.

Galaxy Z Fold 6 dummy image 11

You’ll immediately notice that the cover screen on the Galaxy Z Fold 6 is wider. That is something we knew would happen for a long time. That will also make the device wider when opened too.

You’ll also notice that the Galaxy Z Fold 6 has sharper corners compared to the Fold 5. Samsung is doing that to bring it closer to the Galaxy S24 Ultra design language, it seems.

Three additional images have been shared, showing off the design of the upcoming foldable

In addition to that one image we shared above, three additional ones were shared. You can check them out in the gallery below. They’re showing off the Galaxy Z Fold 6 dummy from several angles.

You can clearly see that the phone will have three cameras on the back, with pretty much unchanged placement. The frame around the device will be flat.

The Samsung Galaxy Z Fold 6 and Galaxy Z Flip 6 are rumored to arrive on July 10. The event will allegedly take place in Paris, though Samsung still hasn’t confirmed anything. The Galaxy Ring is also expected to arrive. That device will become the company’s very first smart ring.

The Galaxy Watch 7 series is also expected to launch during the same event, and the same goes for a new pair of Samsung earbuds.


[ad_2]
Source link

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

0
[ad_1]

A threat actor has claimed responsibility for leaking the personal data of 5 million Ecuadorian citizens.

The announcement was made via a post on social media tweets from the DarkWebInformer account.

The breach has raised significant concerns about data security and privacy in the country.

Details of the Breach

The threat actor, whose identity remains unknown, posted a message on a tweet stating that they had successfully infiltrated a government database and extracted sensitive information.

The leaked data reportedly includes names, addresses, phone numbers, and national identification numbers.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

According to cybersecurity experts, the data appears to be authentic, and the scale of the breach is unprecedented in Ecuador.

“This is one of the largest data breaches we have seen in recent years,” said Carlos Mendoza, a cybersecurity analyst.

“The implications for the affected individuals are severe, as this information can be used for identity theft and other malicious activities.”

In response to the breach, the Ecuadorian government has launched an investigation to determine the source and extent of the leak.

The Ministry of Telecommunications and Information Society issued a statement urging citizens to remain vigilant and monitor their accounts for suspicious activity.

“We are taking this matter very seriously and are working with international cybersecurity experts to mitigate the impact of this breach,” the statement read.

The government has also set up a hotline and a dedicated website for citizens to check if their data has been compromised and to receive guidance on protecting themselves.

Public Outcry and Concerns

The news of the data breach has sparked outrage among Ecuadorian citizens, many of whom are demanding greater government accountability and transparency.

Social media platforms are flooded with comments from concerned individuals expressing their frustration and fear over potentially misusing their personal information.

“This is a wake-up call for all of us,” said Quito resident Maria Fernandez. “We need stronger data protection laws and better security measures to prevent such incidents in the future.

“As the investigation continues, the focus remains on identifying the perpetrators and ensuring that the affected citizens receive the necessary support and protection.

The incident is a stark reminder of the growing threat of cyberattacks and the importance of robust cybersecurity measures in safeguarding personal information.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

OnePlus Nord CE4 Lite launch date announced, live photo leaked

0
[ad_1]

The OnePlus Nord CE4 Lite 5G (yeah, that’s a mouthful) is officially set for a June 18 launch. The company’s announcement didn’t explicitly name the device but an Amazon page gave it away. The handset has also leaked in a live photo ahead of its debut next week.

OnePlus announces a launch date for the OnePlus Nord CE4 Lite

There have been some contrasting rumors about the OnePlus Nord CE4 Lite’s launch date. Some said the device will go official in June, while others hinted at an early July unveiling. The company has now settled all the debate. OnePlus India took to X to announce that “your all-day entertainment companion” is arriving on June 18 at 7 PM local time. The post didn’t reveal the device’s name, while the accompanying image only showed its corner.

However, Amazon India didn’t hold back. A “Notify Me” microsite published by the retailer features a similar image with “OnePlus Nord CE4 Lite” in the file name. The page title also names the product and reveals that it will be a 5G handset with 8GB RAM and 128GB storage. There may be more configurations, of course. One of the color variants will be called Mega Blue. This is all we can take away from these official teasers.

OnePlus Nord CE4 Lite 5G official teaser launch date

Meanwhile, a live photo of the OnePlus Nord CE4 Lite has leaked to show its rear design. Posted on X by @gadget_bits—which incorrectly predicted a July launch for the phone—the image confirms a dual camera setup on the back, along with dual LED flash. We can also see “50MP ASPH” imprinted below the cameras, confirming a 50MP primary camera with an aspherical (ASPH) lens, a lens that doesn’t have a spherical surface shape.

The leaked design supports rumors that the OnePlus Nord CE4 Lite is a rebranded OPPO K12x launched in March. A Geekbench listing for the phone confirms the Snapdragon 695 chipset with 8GB RAM and Android 14. If these rebrand rumors are accurate, then we are looking at a 6.67-inch OLED display, an under-display fingerprint scanner, a 16MP selfie camera, stereo speakers, and a 5,500mAh battery with 80W fast charging.

OnePlus Nord CE4 Lite 5G leaked live photo

Another Nord 4 series device is on the way

The OnePlus Nord CE4 Lite will reportedly be available for pre-order immediately after its unveiling on June 18. General sales may begin on June 24. It’s the second model in the series, following the OnePlus Nord CE4 that launched in April. The company has another model in the pipeline. It is readying the standard OnePlus Nord 4 with no CE (Core Edition) or Lite branding. The device is rumored to go official in July.


[ad_2]
Source link

Smishing Triad Hackers Attacks Banking, E-Commerce Platform

0
[ad_1]

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.

Resecurity researchers have recently revealed that the Smishing Triad group has launched a fresh smishing campaign targeting Pakistani mobile users.

The gang members send harmful messages pretending to be Pakistan Post via iMessage and SMS in an attempt to steal personal and financial information.

These continue their previous operations in the:–

Following recent data breaches, the crew is estimated to be sending 50,000-100,000 automated daily smishing messages, using stolen dark web databases containing the phone numbers of Pakistani citizens.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

Technical Analysis

This huge operation points out that telecom firms should improve their capabilities for identifying fraud and taking a proactive approach by stopping this malicious activity from occurring continuously against clients.

Smishing message (Source – Resecurity)

The Smishing Triad has spread its smishing operations into Pakistan, sending malicious messages claiming to be from Pakistan Post to steal mobile users’ personal and financial information.

Using stolen local phone number databases, the actors send a maximum of 100,000 smishing texts daily, using URL shorteners and QR codes to avoid detection.

Some serve as validation tactics for targeted attacks on active users.

Fake message from Pakistan Post (Source – Resecurity)

The actors exploit these recent data breaches that have exposed Pakistani citizens’ data to pose as legitimate local firms asking for payment details.

This resulted in PKCERT releasing a security advisory on March 27th, 2020, regarding this widespread campaign targeting major Pakistani carriers.

In addition to Pakistan Post, the group also impersonates courier services with fake delivery scams, which shows how their smishing tactics continue evolving across different countries.

Fake Pakistan Post Payment Page (Source – Resecurity)

Besides this, the Smishing Triad group is still attacking victims from all over the world.

They have various hosts and domain names mapped to the same IP address 23.231.48.129 for their smishing kits.

The actors, in addition to impersonating Pakistan’s postal services, recently targeted Correos, Spain’s state-owned postal provider, confirming their previous activities in July 2023.

This shows that the gang keeps operating all the time on a large scale and changing ways of conducting smishing attacks against postal and delivery services across regions like Pakistan and EU.

Mitigations

Here below we have mentioned all the provided mitigations:-

  • Be Skeptical
  • Don’t Respond
  • Verify the Source
  • Don’t Click on Links
  • Use Security Software
  • Report Suspicious Messages
  • Educate Yourself

IOCs

Domain Names:-

  • ep-gov-ppk[.]cyou
  • pk-post-goi[.]xyz
  • pak-post[.]com/id
  • pakpotech[.]top/id

URLs:-

  • l[.]ead[.]me/bf6fB8
  • is[.]gd/bpEPk3
  • l[.]ead[.]me/BjsT
  • is[.]gd/8vcwYW
  • 2h[.]ae/nwxP
  • 2h[.]ae/cNRd
  • ytfrt[.]top/id
  • linkr[.]it/4bStpB
  • qrco[.]de/bf56c0

Phone Numbers:-

  • +923361021455
  • +923301956704
  • +923315640313
  • +601128430746
  • +923301956704
  • +923328862313
  • +923121461238

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

Samsung Galaxy S25 battery capacity has been revealed

0
[ad_1]

The Samsung Galaxy S25 battery capacity has just been revealed. The information comes from GalaxyClub.nl, as the source claims that the battery capacity will remain unchanged. The Galaxy S25 will have a 4,000mAh battery.

The Galaxy S25 battery capacity has seemingly been revealed

As a reminder, both the Galaxy S20 and Galaxy S21 had a 4,000mAh battery. Then Samsung decided to decrease it with the Galaxy S22 (3,700mAh) and Galaxy S23 (3,900). With the Galaxy S24, the company brought back a 4,000mAh unit.

The Galaxy S24 did not have the best battery life, that’s for sure. However, it was notably better than what the Galaxy S22 and Galaxy S23 offered. It was not great, but not exactly bad either. Chances are we’ll get something similar with the Galaxy S25.

Do note that the Galaxy S25 will be the smallest smartphone in the series. The Galaxy S25+ and Galaxy S25 Ultra will be notably bigger, and will thus require bigger battery packs, to power their larger displays.

All three phones are expected to arrive in Q1 2025

The entire Galaxy S25 series is expected to drop in the first quarter of next year. If we had to guess, we’d say that they’re coming in January, as the Galaxy S24 series arrived in January this month.

All three phones are a bit of a mystery at this point. Their designs did not leak out just yet, even though Samsung is not expected to make major changes, but we’ll see. It’s about time for a change so… we’ll see.

The Snapdragon 8 Gen 4 is expected to fuel all three smartphones. The inclusion of Exynos variants remains to be a possibility, though, we’ve seen some conflicting reports on that.

What’s interesting is that the Galaxy S25 is rumored to have a larger display than its predecessor. It will allegedly include a 6.36-inch panel instead of a 6.2-inch one. The Galaxy S25+ and Galaxy S25 Ultra are tipped to retain display sizes.


[ad_2]
Source link

Amazon is trailing behind with its new Alexa

0
[ad_1]

Amazon, Google, and Apple crafted the three best voice assistants on the market. Alexa, Amazon’s assistant was slated to receive a huge generative AI make-over. However, according to a new report, Amazon is falling behind with the new Alexa.

Right now, it’s hard to say what is the best voice assistant on the market. Google Assistant was at the top of the pecking order for a while, but Google has been trimming it down in preparation for Gemini to take over. However, that process has been less than smooth.

In Apple’s camp, Siri is set to get a ton of generative AI goodness through Apple Intelligence. That’s going to make it the best voice assistant on the market, hands down. However, it’s not currently available, so it can’t wear the championship belt just yet. So, the competition is between a handicapped Google Assistant, a half-baked Gemini, the concept of a better Siri, and Alexa.

Amazon is falling behind with its new Alexa

Last Fall, Amazon held an event that was 90% about AI. During the event, the company announced a revamped Alexa that will be powered by generative AI. This technology would make it more conversational and give it the ability to generate content. Rather than being text-based, it would just be vocal. You could, for example, ask it to generate a bedtime story and read it for you.

This was exciting for many people, as it would make Alexa more useful. Also, the new Alexa would be available on a ton of Alexa devices both old and new.

Organization (or a lack thereof)

This is all good news, but when will we actually see it? The event happened about seven months ago, and we haven’t heard anything about the new feature. According to a new report, Amazon is really falling behind with its implementation of the new Alexa. As noted by Fortune, “none of the sources… believe Alexa is close to accomplishing Amazon’s mission of being ‘the world’s best personal assistant,’”

The publication interviewed several former employees, and they told Fortune some of the reasons why the e-commerce giant is trailing behind the competition. One major reason is the organization of the teams. There are thousands of people working on Alexa, but they’re all spread out among several teams. So, there’s friction and an overall lack of unity between the teams. For a company as large as Amazon, that’s not something you want to hear.

Alexa vs. Alexa

Another hurdle mentioned by former workers is something that Google is also dealing with, and that is, well, Alexa. More specifically, the current workers need to cut ties with the current Alexa before it can move on. The current Alexa was built up over nearly a decade, so there are probably millions of lines of code that the company needs to comb through. It might be much harder to implement AI into an existing product than it is to start a new one from scratch. One former employee told Fortune that they needed to “basically burn the bridge with the old Alexa AI model and pivot to only working on the new one.”

Amazon is having trouble getting the new Alexa to make the appropriate API calls and understand natural language. These are extremely important if the company wants to construct a proper Gemini/Siri competitor.

Amazon responded

While Amazon is in the middle of fumbling its game-winning product, the company still appears to be optimistic about it. Kristy Schmidt told The Verge that, “Our vision for Alexa remains the same,” she continued to say, “We have already integrated generative AI into different components of Alexa, and are working hard on implementation at scale — in the over half a billion ambient, Alexa-enabled devices already in homes around the world.”

That isn’t quite the most convincing, but it shows that the company is still working on its ambitious plans.


[ad_2]
Source link

Location Tracker Firm Tile Hit by Data Breach, Hackers Access Internal Tools

0
[ad_1]

Millions of users of Tile, one of the leading Bluetooth location-tracking device vendors, may have had their personal information exposed following a recent data breach, which has led to a ransom demand.

According to 404 Media, the hacker gained access to internal company tools using the stolen credentials of a former Tile employee and accessed multiple Tile systems to steal sensitive data.

This data included tools used for transferring ownership of the Tile tracker, creating admin accounts, and sending user notifications, as shown in screenshots also provided by the actor.

The screenshot shows what the hacker could access amid the data breach (Credit: 404 Media)

Location data-focused Life360, the parent company of Tile, announced on June 11th, 2024 that it had detected unauthorized access to its customer support platform. According to the company’s press release, Tile was targeted by a “criminal extortion attempt,” where an unknown actor informed them about possessing Tile’s customer information.

The company immediately investigated and discovered unauthorized access to a Tile customer support platform, but not the Tile service platform. While the company assures users that no financial data, passwords, or location information was compromised as the platform never stored this data, sensitive user data may be exposed, including names, physical addresses, email addresses, phone numbers, and Tile device identification numbers.

“We believe this incident was limited to the specific Tile customer support data described above and is not more widespread,” Life360 CEO Chris Hulls stated, reinstating their commitment to protecting customer information and taking steps to protect their systems from bad actors. 

It is worth noting that the press release is not available to users outside the United States therefore a screenshot of it is available below:

Tile Life360 Data Breach

The company has reported the incident and extortion attempt to law enforcement. Nevertheless, this breach highlights the vulnerability of companies that track people’s locations and how they can become targets for hackers.

Tile users should be cautious of phishing attempts, as email addresses were exposed. Be wary of emails asking for personal information or login credentials. Monitor your accounts for suspicious activity on email and bank accounts associated with your Tile account.

Experts Comments

Piyush Pandey, CEO at Pathlock, a Flemington, New Jersey-based identity and access security provider commented on the data breach pointing out multiple factors involved including the potential threat carried out by former or disgruntled employees and lack of security authentication.

In this instance, it appears that access was given using the admin credentials of a former Tile employee, which points to a key tenant of identity security – the ability to have proactive visibility to the access and entitlements of users throughout the joiner, mover, leaver portions of the identity lifecycle.

It also seems that there was a lack of multi-factor authentication, which may have thwarted access being granted with just a username and password. This breach also points to the criticality of securing service account access in addition to the primary line-of-business applications, added Piyush.

Callie Guenther, Senior Manager, Cyber Threat Research at Critical Start highlighted the significant threat intelligence implications after the data breach including targeted extortion, supply chain vulnerabilities, data sensitivity, incident response, etc. Callie also advised to implement the following measures to protect administrator accounts:

  1. Multi-Factor Authentication (MFA): Require MFA for all admin accounts to add an extra layer of security.
  2. Strong Password Policies: Enforce the use of strong, unique passwords and regular password changes.
  3. Least Privilege Principle: Grant admin rights only to those who need them, minimizing the number of users with high-level access.
  4. Regular Audits and Monitoring: Continuously monitor and audit admin account activities to detect and respond to suspicious behavior promptly.
  5. Security Awareness Training: Educate employees on recognizing phishing attempts and the importance of safeguarding credentials.
  1. Live Nation Confirms Massive Ticketmaster Data Breach
  2. LetMeSpy Android Spyware Shuts Down After Data Breach
  3. QuaDream, Israeli iPhone hacking spyware firm, to shut down
  4. Hackers Sell Fake Pegasus Spyware on Clearnet and Dark Web
  5. Dell Discloses Data Breach As Hacker Sells 49 Million Customer Data

[ad_2]
Source link

Galaxy Tab S10 series spotted on Samsung OTA server

0
[ad_1]

Samsung has been doing an excellent job in the smartphone market, and another area where Samsung is doing relatively well is tablets. The company is set to introduce the new Galaxy Tab S10 series and has already started One UI testing for the new devices. South Korean company plans to announce the new tablets in 2025. We expect the Galaxy Tab S10 series to debut alongside the Galaxy S25 series and Galaxy Z Fold 6 Ultra.

Samsung is developing the Galaxy Tab S10 series

Earlier, we shared with you that we discovered the Galaxy Tab S10 Plus and Tab S10 Ultra in our database. The model number for the Galaxy Tab S10 Plus is SM-X828x, while the Galaxy Tab S10 Ultra’s model number is SM-X926x. Note that the “x” in the model numbers refers to the region code. The model numbers had surfaced earlier. Now, we have discovered that Samsung is testing One UI builds for the upcoming tablets on Samsung’s servers.

We discovered a test build for Galaxy Tab S10 Plus with the build number (X828USQUAXF5/X828UOYNOAXF5/X828USQUOAXF5) on Samsung’s servers. The build number, including “X828U,” confirms the device’s model number (SM-X828). The presence of “U” within the code points towards a US variant of the tablet. Additionally, the “XF” signifies a build compiled in June, while the final digit “5” represents the current build number. This information reveals that Samsung is actively testing software specifically designed for the US version of Galaxy Tab S10 Plus. Note that the “U” letter in the “UAXF5” is for the new features and bug fixes.

Samsung has also started testing One UI builds for the Galaxy Tab S10 Ultra. A firmware with the model number (X926BXXUOAXE6/X926BOXMOAXE6/X926BXXUOAXE6) is present on Samsung’s server. “SM-X926B” model number is for Galaxy Tab S10 Ultra, with the “B” indicating it will launch globally. “XE” shows the build was compiled in May, and “6” represents the 6th test build for the Galaxy Tab S10 Ultra.

Our previous findings only included the model number SM-X926B for Galaxy Tab S10 Ultra. However, we have now spotted additional model numbers, SM-X926C and SM-X926N. This reveals that Korean and Chinese variants of the Galaxy Tab S10 Ultra have also surfaced.

Expected Features & Release Date

While details about the Galaxy Tab S10 series technical specifications remain under wraps, there’s plenty of reason to be excited. The previously surfaced leaks revealed Galaxy Tab S10 Plus will come with MediaTek Dimensity 9300 though.

Samsung still has a considerable amount of time before officially introducing the Galaxy Tab S10 series. Note that Samsung has not yet released a test build for the regular Galaxy Tab S10. It seems Samsung is first focusing on the Plus and Ultra models, not because they are ditching the regular model, but because there is still a long time ahead of the tablet’s launch.

We do not have the exact launch date for the Galaxy Tab S10 series, but we expect the devices to be available in Q1 2025. Samsung introduced the Galaxy Tab S8 and Galaxy S22 series in March 2022, followed by new devices one and a half years later. In August 2023, Samsung launched the Galaxy Tab S9 and Galaxy Z Fold 5. We anticipate that the new Galaxy Tab S10 series will launch alongside the Galaxy S25 after a similar break of approximately 1.5 years again.


[ad_2]
Source link

Sleepy Pickle Exploit Let Attackers Exploit ML Models & End-Users

0
[ad_1]

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or manipulate outcomes in their favor.

By compromising the ML models, hackers can degrade the system performance, cause financial losses, and damage the trust and reliability of AI-driven applications.

Cybersecurity analysts at Trail of Bits recently discovered that Sleepy Pickle exploit lets threat actors to exploit the ML models and attack end-users.

Technical Analysis

Researchers unveiled Sleepy Pickle, an unknown attack exploiting the insecure Pickle format for distributing machine learning models. 

Unlike previous techniques compromising systems deploying models, Sleepy Pickle stealthily injects malicious code into the model during deserialization. 

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

This allows modifying model parameters to insert backdoors or control outputs and hooking model methods to tamper with processed data by compromising end-user security, safety, and privacy. 

The technique delivers a maliciously crafted pickle file containing the model and payload. When deserialized, the file executes, modifying the in-memory model before returning it to the victim.

Corrupting an ML model via a pickle file injection (Source – Trail of Bits)

Sleepy Pickle offers malicious actors a powerful foothold on ML systems by stealthily injecting payloads that dynamically tamper with models during deserialization. 

This overcomes the limitations of conventional supply chain attacks by leaving no disk traces, customizing payload triggers, and broadening the attack surface to any pickle file in the target’s supply chain. 

Unlike uploading covertly malicious models, Sleepy Pickle hides malice until runtime. 

Attacks can modify model parameters to insert backdoors or hook methods to control inputs and outputs, enabling unknown threats like generative AI assistants providing harmful advice after weight-patching poisons the model with misinformation. 

The technique’s dynamic, Leave-No-Trace nature evades static defenses.

Compromising a model to make it generate harmful outputs (Source – Trail of Bits)

The LLM models processing the sensitive data pose risks. Researchers compromised a model to steal private info during conception by injecting code recording data triggered by a secret word. 

Traditional security measures were ineffective as the attack occurred within the model.

This unknown threat vector emerging from ML systems underscores their potential for abuse beyond traditional attack surfaces.

Compromising a model to steal private user data (Source – Trail of Bits)

In addition, there are other kinds of summarizer applications, such as browser apps, that improve user experience by summarizing web pages.

Since users trust these summaries, compromising the model behind them for generating harmful summaries could be a real threat and allow an attacker to serve malicious content.

Once altered summaries with malicious links are returned to users, they may click such a link and become victims of phishing scams or malware.

Compromise model to attack users indirectly (Source – Trail of Bits)

If the app returns content with JavaScript, it is also possible that this payload will inject a malicious script.

To mitigate these attacks, one can use models from reputable organizations and choose safe file formats.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

Ulefone shares Armor 26 Ultra durability tests: Video

0
[ad_1]

Ulefone has just shared the Armor 26 Ultra durability tests in a video format. You can check out the said video below the article, as it has been embedded. It has a duration of a minute and a half, and it has some really “fun” tests in it.

The Ulefone Armor 26 Ultra durability test video is actually quite fun to watch

Ulefone is always trying to think of new and fun ways to torture test its devices. In this video, you’ll see a paper burning on a phone. In addition to that, Ulefone decided to use the Armor 26 Ultra’s screen as a hammer, and stab it with a knife… in addition to other tests.

Drop tests are also included here, of course. The Armor 26 Ultra got thrown down a flight of stairs and from various distances. It was even frozen and then thrown from a specific distance. In this video, Ulefone also proved that the Armor 26 Ultra is water-resistant.

This phone is IP68/IP69K & MIL-STD-810H certified

Yes, the phone is both IP68/IP69K and MIL-STD-810H certified. That not only means that it can survive under water, but also that it can withstand dust, and be dropped from a specific height (up to 1.8 meters).

Ulefone also included the Gorilla Glass 5 on top of the Armor 26 Ultra’s display. That display protection is obviously enough for this phone to be used as a hammer, which says a lot about Corning.

It has a gigantic battery on the inside

The Armor 26 Ultra is one of the company’s newest smartphones, and in addition to being a tank, it also has a 15,600mAh battery. The phone supports 120W charging, and it is fueled by the MediaTek Dimensity 8020 SoC.

It comes with 12GB of RAM, but you can expand that up to 24GB thanks to virtual RAM. The phone includes 512GB of internal storage. It is also worth noting that it comes in regular and Walkie-Talkie versions.

This handset will soon be on sale as part of the Ulefone Summer Sale. Various other devices will be discounted up to 69%, by the way. You can find all the relevant links below.

Buy the Ulefone Armor 26 Ultra (AliExpress)

Buy the Ulefone Armor 26 Ultra Walkie-Talkie (AliExpress)

Ulefone Armor 26 Ultra (more info)

Ulefone Armor 26 Ultra Walkie-Talkie (more info)

Ulefone Summer Sale


[ad_2]
Source link