Here are the most downloaded apps across the world

0
[ad_1]

Have you ever asked yourself what the most downloaded apps in the world are? Maybe you find yourself dabbling in the Play Store or App Store, checking how many downloads most apps have. Well, if you do this, know that you aren’t a weirdo, as the topic of what app has the most downloads is an important one.

It brings insight into which apps most people around the world use, hence the need to download them on various devices. Various research shows that most people around the world spend most of their time on social media apps. So if you think a social media app tops the list of apps with the most downloads, you are very correct. But the question is, which social media app tops the list?

The sources of this data insight, App figures, took into consideration the apps with the most downloads on Android and iOS. They then made a nice compilation of both platforms to give a clear picture of the apps most people have on their devices. Surprisingly, the lists for Android and iOS are distinctively different, pointing out that users of both platforms have different needs.

Most downloaded apps on Android and iOS show a slight difference in user taste

The sources of the data insight, App Figures, picked the top 10 most downloaded apps on both mobile operating systems’ app stores (this article will consider the top 5). This data doesn’t represent just apps downloaded to an Android smartphone or an iPhone. If it did, then the figures will be quite smaller than what App Figures was able to come up with.

Note that the Google Play Store is used not only on Android smartphones but also tablets, Chromebooks, and smart TVs. The same is true of the App Store as it represents iPhones, iPads, and other Mac products. So, this data covers the apps that two entire ecosystems of devices download.

On the iOS (App Store) side of things, TikTok tops the list, packing over 17M downloads. Following it closely is CapCut with 14M downloads, while Instagram, Google, and Google Maps all have 10M downloads. Downloads for the last two apps aren’t reflected on the Android side, as they come preinstalled.

For the Android community (Play Store) Instagram tops the list with 38M downloads. Following it are four other social media applications, namely Facebook, TikTok, WhatsApp, and Snapchat. The app with the highest downloads among these four is Facebook, coming in at 34M downloads.

Bringing the downloads of both platforms together puts Instagram on top of the list with over 50M downloads. Next to it is TikTok with 47M downloads, and then you get Facebook with 41M downloads. WhatsApp follows closely with 34M downloads and last in the top five is CapCut coming in at 28M downloads.

CapCuts’ relevance on both platforms is fueled by TikTok, as it is the go-to app for editing TikTok videos. The remaining apps on the top 10 list comprise three social media apps, a music streaming app, and a shopping app. For the social media apps, you have Telegram (topping the list), Snapchat, and Messenger (closes the top ten list). Just under Snapchat, you have Spotify and SHEIN both having 20M downloads.

Despite all the surrounding fuss in recent times, Twitter failed to be on the list of the most downloaded apps on either platform. This list clearly shows how much Android and iOS users rely on social media platforms. Posting, liking, commenting, and sharing are everyday activities for users of both platforms.


[ad_2]
Source link

Exynos 2500 and next Galaxy Watch processor will be 3nm chips

0
[ad_1]

Samsung may debut its first 3nm smartphone processor in early 2025. Rumors have it that the Exynos 2500, which should power the Galaxy S25 series, will be based on a 3nm process. The company will also apply the same process node to its next-gen W-series Exynos processor for wearables.

Samsung started mass-producing 3nm chips last year. The company is using a new GAA (Gate All Around) transistor architecture for these advanced semiconductors. However, it is struggling with the yield rates of the chipsets. This has affected the Korean firm’s 3nm production capacity.

It isn’t yet ready to apply the 3nm process node to smartphone processors. The company is supplying the initial production run to clients in other tech sectors, such as cryptocurrency mining.

However, Samsung will eventually make 3nm smartphone processors once it improves its yield rates and addresses other shortcomings in the first-gen solutions. According to Twitter tipster @TheGalox_, the Exynos 2500 will be the company’s first 3nm chipset intended for smartphones. As said earlier, the new chipset will power the Galaxy S25 series in early 2025, at least in some markets. The Exynos 2400, which is rumored to ship inside the Galaxy S24 series in some markets, is a 4nm chipset.

Samsung may soon launch a 3nm wearable processor

Samsung is reportedly also considering making 3nm wearable chipsets. Its current solution Exynos W920 is based on a 5nm process node. Introduced in mid-2021, this chipset powers the Galaxy Watch 4 and Galaxy Watch 5 series globally. It features two ARM Cortex-A55 CPU cores and the ARM Mali-G68 GPU.

There are rumors that the Galaxy Watch 6 series will get an improved processor. It’s unclear whether we are in for a tweaked version of the Exynos W920 or Samsung is developing a new solution from the ground up. In that case, it could very well be a 3nm chip. The company may be looking to apply its 3nm process node to wearable chips before moving to smartphones. Its current 3nm capacity may be enough for the Galaxy Watch 6 lineup.

Samsung’s next-gen smartwatches will debut within the next few months. We are expecting the Galaxy Watch 6 and Galaxy Watch 6 Classic to arrive sometime in August or September of this year. The latter model will feature the iconic physical rotating bezel. These watches will be accompanied by a couple of new foldables — Galaxy Z Fold 5 and Galaxy Z Flip 5 — and probably a new pair of TWS earbuds as well. Stay tuned for more information.


[ad_2]
Source link

Instagram finally lets you add more than one link in your bio

0
[ad_1]

Instagram, one of the most popular social networks in the world, is finally allowing the millions of its users to add more than a single link in their profile bios. This change was revealed just recently by Meta head honcho Mark Zuckerberg himself, admitting that adding multiple links to a Instagram profile bio has been one of the most requested features up until now. 

If you go to your Instagram account right now and tap on the Edit profile button, you will find that the add links menu lightly changed, allowing you to add up to five external links in your profile, including your Facebook account which also counts up towards the quota. 
Engadget reports that as the change rolls out to the regular Instagram user, the app might even prompt you to populate your bio with external links. However, in your actual Instagram bio, only one link will show up, with a hint as to how many other links follow; those will be shown at a tap. 
Up until now, Instagram users willing to add more external links to their profiles had to resort to third-party solutions, with the most popular one being the Linktree service. If you wanted to direct your followers to other social networks of websites, you have to sign up for Linktree, add your links in the service, and finally, input the single Linktree link into your Instagram bio. A cumbersome and unintuitive process, all things considered, but it’s worth noting that Linktree, as well as most other services of the type, allow you to input more than five links, as well as some extra customization of your dedicated page.  

[ad_2]
Source link

Woman tracks down and turns table on Airbnb scammer

0
[ad_1]

A “superhost” scammed a woman out of a thousand dollars. She didn’t take it lying down.

The internet is full of Airbnb scams and accounts told by victims. But there is a twist in this latest story-gone-viral that is usually lacking in most narratives: The victim evens the score.

Airbnb host and scammer “Mr. Tyler” met his match when his would-be guest, TikTok user Olivia (@livvoogus), discovered his personal information after arriving at a property in Florida she could not get into. Her scam suspicions were confirmed that day.

In a TikTok clip detailing the events, she revealed she booked the place months before the New Year’s Eve music festival she and her friends planned to attend. The listing didn’t raise any red flags, and Mr. Tyler was a Superhost—described as “the best-rated, most experienced hosts” by Airbnb. The property also had good reviews.

Then things got sketchy while driving up to Jacksonville.

“The Airbnb host had sent us two different codes for the door and just stopped responding to any questions that we had, like where to park or how to get into the building—just kind of went ghost,” Olivia said. The neighbor came out and told them that a couple who came by last night also couldn’t get in, suggesting they were not the only ones Mr. Tyler scammed.

“The person who had lived there got evicted because, according to the lease, you’re not allowed to do Airbnbs out of the apartment, and he just never took the listing down,” she said.

Enraged, Olivia searched the internet for details about her host and eventually found his name, birthday, and parents’ address. She messaged Mr. Tyler to ask if she was supposed to meet him at his parents’ place, the address of which she included, because what he gave them was the incorrect address.

“This man called me back. So. Quickly,” Olivia enthused. What came next was also recorded and posted on TikTok. The clip was captioned, “when you travel long and far to find out your airbnb is fake and you go to extreme lengths to find out everything about the host and then call them to expose such information.”

In the end, Airbnb refunded Olivia, and she found a hotel room. The company paid a percentage of the cost for the following night, although Olivia believes Airbnb should’ve paid for it all. One TikTok commenter jokingly suggested that Olivia “send a bill to Tyler’s parents’ house”.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Dark Alliance lands on Android

0
[ad_1]

Classic ARPG games like Baldur’s Gate: Dark Alliance aren’t necessarily a rare occurrence on mobile. But that doesn’t make it any less exciting when one of them does happen to appear. And that’s what gamers on Android are looking at today as Baldur’s Gate: Dark Alliance has just arrived for devices. The game can be picked up on Google Play and will cost you a premium price of $9.99.

While the majority of the mobile game landscape these days is littered with free-to-play options, ports of many classic titles remain a premium offering. In fact you’ll find a handful of mobile ports of different ARPGs from the Dungeons & Dragons universe. Including Icewind Dal: Enhanced Edition, Baldur’s Gate: Enhanced Edition, Baldur’s Gate II: Enhanced Edition, Neverwinter Nights: Enhanced, and Siege of Dragonspear. All set at the same $9.99 price.

Baldur’s Gate: Dark Alliance offers full controller support

Many games on Android are ported with great care and end up offering some excellent touch controls. But touch controls are not for everyone and it’s great when the developers recognize that. As pointed out by Android Police, Dark Alliance has full controller support so you don’t need to use the touch controls if you prefer not to.

Though honestly they’re pretty decent if you do decide to give them a shot. Should you still prefer a mobile controller, you’ve got plenty to choose from. Like the Razer Kishi V2 which is our personal favorite.

In addition to controller support, the game has three available classes you can play, and many hours of content to sink your teeth into. There’s even a local co-op feature if you have a second controller and want to play the game with someone else. And for $9.99, that seems like a pretty good value. All of that said, the game is fairly large in size at 2GB. So make sure you’ve got the space if you’re on older devices.


[ad_2]
Source link

Smartphone market declined 12% in Q1 2023, Apple closes in on Samsung

0
[ad_1]

The global smartphone market has been in a downward spiral throughout 2022 and there’s no sign of a recovery in 2023 either. According to research firm Canalys, smartphone shipments were down 12 percent year-on-year (YoY) in Q1 2023. This is the fifth consecutive quarter of a YoY decline in shipments, beginning in the first quarter of last year.

Vendor-wise, Samsung remains the world’s largest smartphone company but Apple is closing in on it. The Korean firm accounted for 22% of all smartphones sold globally in the first three months of 2023. That’s two percentage points below the 24% share in the first quarter of last year. In comparison, Apple’s market share grew from 18% in Q1 2022 to 21 percent in Q1 2023.

As usual, Apple toppled Samsung in the final quarter of 2022. It launches the latest iPhones in late Q3 or early Q4 of every year and goes on to top the quarterly chart for the last three months of the year. But the Korean firm reclaims the top spot in the first quarter of the new year. The story continues in 2023 as well. Canalys says Samsung achieved a quarter-on-quarter recovery this past quarter to reclaim the crown.

Xiaomi, which once leapfrogged Apple to the second spot and threatened Samsung’s dominance, hasn’t been able to replicate that success in recent quarters. Its market share dropped from 13% in Q1 2022 to 11% in Q1 2023. OPPO has closed the gap to it with a marginal YoY growth of one percentage point (9% to 10%). Vivo completes the usual top five with an eight percent market share, unchanged from last year.

“The smartphone market’s decline in the first quarter of 2023 was within expectations throughout the industry,” said Canalys Analyst Sanyam Chaurasia. “The local macroeconomic conditions continued to hinder vendors’ investments and operations in several markets.”

Q1 2023 smartphone market share Canalys

Samsung needs to do well in the smartphone market in 2023

Apple closing the gap with Samsung in the smartphone market is a worrying sign for the latter for obvious reasons. But the Korean firm has other reasons to do well in the smartphone business in 2023.

For years, semiconductors have been its cash cow, particularly memory chips. However, that business has seen a staggering decline over the past few months, so much so that the company’s profit has hit a 14-year-low in the first three months of 2023. Time will tell whether Samsung manages to fend off Apple’s threat and build a sizable gap to the iPhone maker over the next few quarters.


[ad_2]
Source link

Adobe Lightroom adds RAW support for photos taken on your Pixel 4a, 5a, and 6a

0
[ad_1]

Adobe has recently updated its Lightroom application to add RAW photo support for Google’s midrange Pixel smartphones, such as the Pixel 4a, Pixel 5a, and Pixel 6a. This means that users of these devices can now use this popular photo editing app to edit their photos.


Adobe Lightroom is a powerful tool that allows users to adjust various aspects of their photos such as exposure, contrast, color, and more. With the latest update, 9to5Google discovered that Pixel 4a, 5a, and 6a users can now take advantage of this app’s features to enhance their photos and create stunning visual content.


Prior to this update, only a limited number of Android devices were supported by Adobe Lightroom, and certainly not less powerful devices. However, with the inclusion of Google Pixel 4a, 5a, and 6a, a wider range of users can now benefit from the app’s capabilities. This move is likely to increase the app’s user base and make it more accessible to a wider audience.

Traditionally, Google Pixel devices use Google’s computational photography prowess to produce, what most consider to be very good looking photos, without the need for tweaks or a Pro mode. However, RAW images offer photographers greater control over their images by allowing them to capture more detail and information than a standard JPEG image.

The above is why most photographers, or those who need to make significant edits to their images, tend to prefer the RAW format. Thankfully, with the April 2023 update to Lightroom version 6.3 — or Lightroom Classic 12.3 — and the most recent version of the Camera Raw extension (15.3) you will be able to edit RAW photos taken with your mid-range Pixel.

Adobe Lightroom’s support for Google Pixel 4a, 5a, and 6a is part of Adobe’s ongoing efforts to expand its presence in the mobile market. As more users rely on their smartphones to take photos and create content, it makes sense for Adobe to offer support for a variety of devices in its software.


[ad_2]
Source link

Hackers Storing Malware in Google Drive as Encrypted ZIP Files

0
[ad_1]
Malware in Google Drive

Google released the threat horizon report for April 2023, which showed multiple methods used by threat actors for evading security systems.

Google’s Cybersecurity Action Team (GCAT) and Mandiant researched a list of techniques and methods used by threat actors over the period for penetrating the environments and other malicious activities.

Cloud-Hosted Encrypted ZIP Files Evading Detection

Mandiant observations during Q4 2022 showed a technique where threat actors stored malicious files on Google Drive as encrypted ZIP files to evade detection.

A malware campaign also distributed URSNIF malware, a banking bot, and intrusion software by hosting the URSNIF binary in Google Drive.

Threat actors use phishing emails to lure victims into downloading the password-protected malicious ZIP files, which will then install the malware on the victim’s machine.

Q4 2022 also showed another expansion of this technique where DICELOADER malware was distributed, which had multiple purposes.

In this technique, Mandiant observed that the Google Drive link in the phishing email had an LNK file.

When this file is downloaded, it will install a Zoom MSI installer, a Trojan that eventually leads to a DICELOADER infection.

Several other threat actors used this technique for different purposes in several other cases.

Customer Challenges and Solutions When Security Patching Google Kubernetes Engine

Kubernetes has been a great feature for cloud customers due to its availability, flexibility, and security.

However, even Kubernetes needs patching routinely, which installs security and bug fixes.

As per Google’s reports, the 2021-2022 data showed most of the Google Kubernetes Engine (GKE) customers delayed their patching due to the fear that “patching might affect production operations.”

This delay in security patching might sometimes result in vulnerabilities that threat actors can exploit over time.

Many options are available to maintain security patching and business continuity, which can also be combined with scanning and notification services to find vulnerabilities. 

There were many reasons from GKE customers for delaying security patching as,

  • Session maintenance of customers (Pinned sessions) will be terminated.
  • AI/ML application-based clients were worried that unsaved workloads might be lost during the patch and restart activity.
  • Some customers were worried that patching might bring unexpected API changes, affecting their application’s functionality.
  • Large node customers will take more time for patching, creating a weak security posture.

Solutions for Balancing Availability and Security Patching in GKE

  • Choose appropriate and relevant channels (Rapid, Regular, and Stable) upgrades for the applications
  • Use maintenance windows for patching with proper duration.
  • Have maintenance-exclusion windows to prevent upgrades during some special cases.
  • Setting up a Pod Disruption Budget is preferable for session maintenance-based customer applications.
  • Setting up regional clusters rather than zonal clusters is recommended for workload availability.
  • Having a Security posture dashboard is highly result-providing.
  • Using various notification services will have additional security awareness for patching.

The low hanging fruit: Leaked Service Account Keys and the Impact on Your Organization

Leakage of service account credentials has been the greatest threat to organizations with Cloud-based infrastructures.

As per Top Threats for cloud computing during 2022 by CSA (Cloud Security Alliance), 42% of the incidents were leaked key incidents.

Identity, Credentials, Access, and Key management are extremely important for Cloud-based systems as the keys might have access to confidential information.

Most of these were due to new account creation or developers testing their code in a public repository, leading to the leaking of service account credentials.

Google stated, “In 42% of leaked critical incidents detected by our abuse systems, customers did not take action after Google attempted to contact the project owner, so the key remained vulnerable to abuse.

While there are many instances of new accounts or developers testing code exposing service account keys, our teams have observed compromises distributed across varying sizes and maturities of organizations”.

Attackers Shifting Tactics to Conceal API Calls

Threat actors who get these leaked service account credentials have been using several defense evasion techniques to hide the origin of their API calls.

Most attackers use Tor nodes, open proxies, and other compromised cloud instances or cloud service providers for anonymous API calls.

Often, attackers are unaware of the capability of the service credential, hence depending on automation tools to level up its resource utilization resulting in the shutting down of the instance.

Attackers who get knowledge of the discovered credential can do extreme damage to the infrastructure depending upon the permissions of the credential. 

The data survey on the IAM roles of compromised service account keys corresponds to the following data.

  • 67.6% of keys had basic IAM roles
  • 23.5% had Owner roles
  • 44.1% had editor roles

Another report by Palo Alto’s Unit 42 Cloud Threat Research stated, “99% of the cloud users, roles, services, and resources were granted excessive permissions.

Hardcoded credentials checked into code repositories

Credentials leaking onto a public/private repository originate when a developer downloads a service account key (typically an RSA public/private key pair) and uses it to check the code in a private code repository, leaving it there too long.

Instances where these private repositories become public are when the exposure of these keys becomes predominant.

Threat actors cast nets inside repositories to find these keys, considered low-hanging fruits.

As per the Threat Horizon report of Jan 2023, Jenkins, the IT automation software, was the most targeted.

This was because keys and other credentials were found in an organization’s commit along with CI/CD logs which displayed these keys when they were sent as command-line arguments.

Unfortunately, these went unnoticed for a very long. As per IBM’s 2022 Cost of Data breach report, 19% of the breaches were due to compromised or stolen credentials and took the longest time of nearly 243 days to detect.

Another instance where a developer scanned Python Package Index (PyPi) revealed 53 legitimate and valid AWS keys.

The fact is that Amazon themselves had a leaked key, and the oldest active key found in the scan dates back to 10 years.

Mitigations

  • The need for a service account must be validated
  • Local development can use personal account credentials to authenticate
  • Keep an inventory of keys and audit them regularly
  • Having a naming convention for service accounts might be helpful
  • Audit logs monitoring and identify malicious behavior
  • Having policies to disable accounts not used for some time is recommended.

Building Your Malware Defense Strategy – DownloFree E-Book


[ad_2]
Source link

Payment giant’s point-of-sale outage caused by ALPHV ransomware

0
[ad_1]

An issue with the NCR Aloha point-of-sale system turned out to be a ransomware attack claimed by the ALPHV group

On April 12, 2023, payment giant NCR reported it was looking into an issue with its point-of-sale (POS) systems that caused an outage, leaving customers unable to use the system.

The NCR Aloha POS systems are popular in hospitality services. Customers include Wendy’s, Chuck e Cheese, Café Rio, Leeann Chin, and FATZ Café. The NCR website claims the company helps over 100,000 restaurants run their operations. The outage primarily caused problems in the US but some European and Asia Pacific online ordering services were affected as well.

On April 13, NCR found that the root cause of the outage was the result of a ransomware incident. At this point it contacted customers, notified law enforcement, and initiated an investigation aided by third-party security experts.

In a statement on April 17, NCR reassured customers it was working hard to quickly restore functionality:

“We are committed to re-establishing secure access to the impacted Aloha and Counterpoint applications as quickly as possible. We are restoring impacted applications in a new secure environment. We will have further updates on the timeline for rebuilding this new environment, and we are targeting this week to bring these applications back online. We will also be contacting customers with a few key steps to access our new environment.”

Although NCR has released no specific information about the responsible ransomware group, it is rumored that ALPHV aka BlackCat was behind the attack after security researcher Dominic Alvieri found a post to that effect on the ALPHV leak site.

ALPHV has since removed the post in which they claimed to have stolen credentials belonging to NCR’s customers and threatened to publish these data if a ransom was not paid.

“We take a lot of credentials to your clients networks used to connect for Insight, Pulse, etc. We will give you this list after payment,”

The ransomware-as-a-service (RaaS) group ALPHV, also known as BlackCat or Noberus, is currently one of the most active. ALPHV was ranked #4 in our list of most prolific ransomware gangs last month.

ALPHV ransomware is used by affiliates who conduct individual attacks, breaching organizations using stolen credentials or by exploiting weaknesses in unpatched Microsoft Exchange servers. During the attacks, data is stolen and encrypted and the victim is asked to pay a ransom for both a decryption tool, and to prevent the stolen data from being leaked.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Xiaomi 13 Ultra unboxing, let’s see what’s inside

0
[ad_1]

The Xiaomi 13 Ultra got announced yesterday, and we already have a review unit in hand. Now, this is a model made for the Chinese market, as yesterday’s announcement did occur in China, but a global variant is coming. In this article, we’ll talk about the Xiaomi 13 Ultra unboxing, and a video unboxing link is embedded below. Do note that the contents of the box will be basically the same (in global markets), save for the changed paperwork, of course. So, this is basically what you’ll get when you buy the phone after it launches in more markets. Speaking of which, yes, Xiaomi did confirm that the Xiaomi 13 Ultra is coming to various markets around the world. We still don’t know the launch date, yet, however.

We’re unboxing the black variant of the Xiaomi 13 Ultra

Xiaomi shipped us a black-colored model, while three colors launched in China, black, green, and white. It seems like only the black and green (officially called ‘Olive Green’) will make their way to markets outside of China, though. That has not yet been officially confirmed by the company, but only those two models appeared in the company’s global marketing materials, so… that’s likely what’s happening. In any case, if you check out the video below the article, you’ll be able to see the black Xiaomi 13 Ultra unboxed.

So, what’re you getting in the retail box? In addition to the phone itself, you’re also getting a plastic case, with a ribbed pattern on the back. You can feel that under your fingers, and it does add some grip to the phone itself. This case is extremely thin, which is a good thing, as this is not a small phone. It’ll serve you well until you get something else, or even if you decide to keep it, it’s good to go. It does offer good camera protection, and makes the phone sit in the hand nicely.

Xiaomi did include a charger in the box, a 90W charger

You will also find a 90W charging brick in the box, with a Type-A port on it. A Type-A to Type-C USB cable is also included here, and both the cable and the charger itself are white-colored. That will be the case with every model you get, regardless of the phone’s color. It is worth noting that the phone also supports 50W wireless charging, though you’ll need to get a charger separately for that. You can also recharge your truly wireless earbuds on the go, or something like that via reverse wireless charging (10W).

You’ll also notice a SIM ejector pin in the video provided below, of course. Other than that, only the paperwork sits on the inside, that’s it. It’s what you’d expect, to be quite honest. Some smartphone OEMs stopped shipping their smartphones with chargers (like Apple and Xiaomi, for example), but Xiaomi is not one of them. You’re always getting a charger that can take advantage of the maximum charging speed a phone allows. That’s always nice to see, at least from the user’s perspective. Tracking down that 90W charger on the side would be a pain, to say the least.

This phone comes with a truly powerful spec sheet

The Xiaomi 13 Ultra is, overall, a truly powerful smartphone. Spec-wise, it’s one of the most powerful on the market. It includes the Snapdragon 8 Gen 2 SoC, LPDDR5X RAM, UFS 4.0 flash storage, a 5,000mAh battery, fast charging we’ve mentioned earlier, and much more. There are four 50-megapixel cameras on the back, led by a 1-inch camera sensor with variable aperture. Leica lenses are placed on each of those cameras, and the phone is also IP68 certified. The display is the brightest on the market at the moment, as its maximum brightness is 2,600 nits. There’s much more to say here, and if you’d like to take a closer look at the phone’s specs, click here. We’re working on a review as we speak, and until then, feel free to check out the unboxing video below.


[ad_2]
Source link