Best of Computex 2024: AMD Ryzen 9000 Series

0
[ad_1]

This is possibly the most powerful desktop processor on the market.

AMD says that it announced the most powerful desktop processor on the market during Computex 2024, the AMD Ryzen 9000 9950X. That chip is a part of the Ryzen 9000 series that was announced during the show. The AMD Ryzen 9000 series is on the receiving end of one of our Computex 2024 awards, actually. Well, the AMD Ryzen 9000 series, to be more accurate, as more than one chip has been announced as part of the series. The AMD Ryzen 9 9900X and Ryzen 9 9950X were announced. The 9950X model is the top-end variant, but both are extremely powerful.

The AMD Ryzen 9000 series is based on the Zen 5 architecture and goes up to 16 cores

The AMD Ryzen 9000 family of chips is based on the Zen 5 architecture. AMD quoted a 16% improvement in PC over its last-gen chips, and there are four SKUs here to start with. The Ryzen 9 9900X has 12 cores (24 threads), and a 5.6GHz max boost. It also comes with a 76MB cache and a 120W TDP. The Ryzen 9950X, on the other hand, has 16 cores (32 threads), and a 5.7GHz max boost. That chip comes with an 80MB cache and a 170W TDP. New X870 and X870E motherboards were also announced, but you don’t need them for these chips. AMD said that they’ll work on older iterations.

These two chips have the same design as their predecessors… on the outside

The AMD Ryzen 9000 chips look the same as their predecessors… on the outside. So in terms of looks itself, nothing has changed. All the changes lay on the inside. The AMD Ryzen 9950, in particular, delivers “the fastest consumer desktop performance in the world”, says the company. The company said that this chip will cater to gamers and working professionals who use creative tools for 3D modeling, designing, animations, and product visualization. In other words, this is an immensely powerful processor that you should definitely consider if you’re looking for the best of the best.

AMD had plenty to say at Computex 2024, but the Ryzen 9000 family stands out

AMD had plenty to say during Computex 2024. The company also announced its Ryzen AI 300 series processor, that is Copilot+ ready. New motherboards were also announced, as mentioned already, and new Ryzen 5000 series processors too. The Ryzen 9000 series takes the cake, though, easily. Both chips are at the top of the food chain, but the Ryzen 9000 9950X really does stand out, hence our award.


[ad_2]
Source link

Samsung advises Galaxy phone users to download the updated Clock app

0
[ad_1]
According to Sammy Fans, Samsung is advising Galaxy phone users running One UI to install the latest update to its Clock app. Version 12.3.30.35 exterminates bugs while making the app run smoother once the 31.55MB update is installed. The manufacturer says that those who do download the new Clock app will benefit from the improvements and fixes available from the update. The latest version of the Samsung Clock app is available from the Galaxy Store.
The bugs that are being exterminated by the update are not posted and the Galaxy Store’s listing of the Clock app shows only that “A few bugs have been fixed.” The app is free and Samsung is listed as the developer. A Galaxy S24 Ultra user complained earlier this year about an issue he was having with the Clock app. “Hello, I’ve noticed an odd bug with the clock on my S24 Ultra. Sometimes the time gets stuck under the current time and it shows 2 numbers on top of each other. Anyone else been experiencing this?”

On Samsung’s EU community website, the aforementioned Galaxy S24 Ultra user included a photo of his phone showing the Clock app bug. Several other users chimed in and stated that they were experiencing the very same issue with their Clock app. Because Samsung has been tight-lipped over the precise bugs that are taken care of with version 12.3.30.35 of the Samsung Clock app, we can’t for sure that this is one of the issues that the update gets rid of.

More recent complaints included one from a user who gave the app just one star and wrote, “No Sound Anymore. Useless. Tried All Tricks From Online. Still Silent Alarm. Terrible.” And just a few days ago, another Samsung Clock user wrote, “It’s just fine as an app – the one thing that’s been recently bothering me is that for some reason the upcoming alarm notification, which is set to 30 minutes prior, seems to begin notifying my two HOURS prior for specifically my alarm for when to leave for work in the morning.”

He continues by explaining that in his attempt to fix the problem, “I’ve tried deleting the alarm and making the exact same one, turning off the upcoming alarm notification and turning it back on, but still it starts appearing at 6:30am when the alarm goes off at 8:15, so it shouldn’t appear until 7:45. This was only recent, too.”

The Clock app gives Samsung Galaxy users an alarm clock, a world clock showing the time in cities around the world, a timer, and a stopwatch.


[ad_2]
Source link

Google Patched Another Chrome Zero-Day Under Active Attack

0
[ad_1]

Google rolled out another important security update for its Chrome browser as it addressed a zero-day vulnerability. The tech giant admitted detecting active exploitation of the flaw, making it necessary for the users to update their devices with the latest Chrome releases at the earliest.

Latest Google Chrome Release Fix Another Zero-Day Under Attack

Reportedly, Google addressed a high-severity zero-day vulnerability in its Chrome browser with the latest update. The vulnerability, like most other Chrome flaws, went under attack before Google could release a patch.

Specifically, the vulnerability is described as a type confusion flaw in the V8 component. The vulnerability, identified as CVE-2024-5274, received a high-severity rating. The flaw first caught the attention of two Google researchers, Clément Lecigne of Google’s Threat Analysis Group and Brendon Tiszka of Chrome Security, following which, the developers worked on patching the flaw. Google confirmed detecting active exploitation of the vulnerability in its Chrome release update.

The vulnerability affected both desktop and Android Chrome versions, consequently receiving the patch with the latest updates. According to the updates, Google patched the flaws with Chrome for Desktop version 125.0.6422.112/.113 for Windows and Mac, and 125.0.6422.112 for Linux, and Chrome for Android version 125 (125.0.6422.112/.113), respectively.

Google keeps addressing security issues with its Chrome browser as it detects to provide users with a safer browsing experience. With the recent decision to roll out weekly security updates for the Chrome browser, the tech giant takes another step towards alleviating potential security risks and their impact on the users in case of active exploitation attempts. However, since these vulnerabilities often pose a serious threat to the users, it is imperative for the users to update their devices as soon as possible.

The recent update comes days after another security fix for Chrome, also addressing a zero-day vulnerability under active attack.

Let us know your thoughts in the comments.


[ad_2]
Source link

Samsung confirms Galaxy Z Fold 6 & Flip 6 designs by accident

0
[ad_1]

After months and months of rumors and leaks, Samsung has just confirmed the Galaxy Z Fold 6 and Galaxy Z Flip 6 designs… albeit by accident. The company accidentally published a marketing image on its official Kazakhstan website (removed since).

The Galaxy Z Fold 6 & Flip 6 designs have been confirmed by Samsung

If you take a look at the image provided below, you’ll see what we’re talking about. This image pretty much confirms what we’ve been hearing about thus far. Both smartphones are adopting a Galaxy S24 Ultra-like design language, a flatter design if you will.

Samsung Galaxy Z Fold 6 and Flip 6 official marketing image accident

Sharp sides are included here, and the corners are less curved than before. You can also see the redesigned camera island on the back of the Galaxy Z Fold 6. That camera design was partially shown recently.

The Galaxy Z Flip 6 will also have a new look for its rear cameras. Samsung is sticking to that folder-shape design of the cover display on the Galaxy Z Flip 6. This image also basically confirms that the Galaxy Z Fold 6 will retain a side-facing fingerprint scanner.

Samsung’s Galaxy Z Fold 6 handset is gray-colored here, while the Galaxy Z Flip 6 has a blueish tint. Galaxy AI is also mentioned in the image, which is not surprising at all. AI is the buzzword these days, and Samsung is expected to talk a lot about Galaxy AI during the keynote next month.

Both smartphones are expected to arrive on July 10

Speaking of which, the second Unpacked event of the year is rumored to take place on July 10. Samsung still hasn’t confirmed it, but that’s what’s expected to happen. It will allegedly occur in Paris, France.

The Galaxy Z Fold 6 is expected to have a less visible crease than its predecessor and to be wider. The Galaxy Z Flip 6 will retain the same display sizes, and there won’t be all that many changes, save for the ones we’ve mentioned already.

Both smartphones are tipped to utilize the Snapdragon 8 Gen 3 for Galaxy chip. Android 14 will come pre-installed on them, and One UI 6.1.1. Is expected to come pre-installed on top of it.


[ad_2]
Source link

ASUS ROG Zephyrus G16 (2024)

0
[ad_1]

A powerful gaming machine that stays cool at all times.

ASUS had plenty to says at this year’s Computex. The company announced some new laptops, new GPUs, and more. One of the products that received our Computex 2024 award is the ASUS ROG Zephyrus G16 (2024). This is the company’s brand-new 16-inch laptop, which is immensely powerful. It is a gaming laptop, as many of you probably noticed based on the name itself. It’s a part of ASUS’ ROG lineup of products, which are the company’s gaming products. This laptop features one of Ryzen AI chips from AMD, and it comes with a built-in NPU for AI-accelerated tasks. To top it all off, it has the NVIDIA GPU on the inside.

The ASUS ROG Zephyrus G16 (2024) uses an extremely powerful CPU & GPU, utilizes AI

The ASUS ROG Zephyrus G16 (2024) is made out of aluminum, 100%, says the company. It has the ‘Slash Lighting’ array on top of the lid, and it retains the customization of its predecessor. This laptop is fueled by the AMD Ryzen AI 9 HX 370 processor. This chip is immensely powerful, it has 12 cores, 24 threads, and a built-in AMD Ryzen AI XDNA 2 NPU capable of 50 TOPS of AI performance. To top it all off, the Radeon 890M graphics is also included here. Speaking of graphics, you’ll find the NVIDIA GeForce RTX 4070 Laptop GPU included. That GPU by itself is capable of up to 321 TOPS of AI performance. The laptop comes in variants up to 32GB of LPDDR5X-7500MHz of RAM, and up to 4TB of storage.

A 16-inch ROG Nebula OLED display is on offer, with a 240Hz refresh rate

You’ll find a gorgeous 16-inch ROG Nebula OLED display here. This is a 2.5K (2560 x 1600) display with a 240Hz refresh rate. It comes with NVIDIA G-SYNC support, and it’s Pantone Validated, not to mention it has the True Black 500 certification and Dolby Vision too. A 90Wh battery sits on the inside as well, while the tablet itself weighs 1.85kg. That’s not bad at all considering how much tech is packed in here, and considering that this is a gaming laptop. It measures 35.4 x 24.6 x 1.49-1.74cm, in case you were wondering.

Truly advanced cooling system is on board, along with 6 speakers

Windows 11 Pro comes pre-installed here, while ASUS also included ROG Intelligent Cooling. The Tri-Fan tech is a part of the package, and Arc Flow Fans 2.0 are used. ASUS says that you’re getting 0dB Ambient Cooling here. This laptop goes a long way to make sure you can game without having to worry about heat. The keys on the laptop have a 1.7mm travel distance, and the touchpad is 37% larger this time around. The keycaps are also 12% larger, and the keys have been tested for 20 million key presses, which is plenty. A ‘Stealth Hinge’ is also included, and you’ll also find 6 speakers here, with dual side woofers. As you can see, there’s a ton of tech packed inside this beastly gaming laptop.


[ad_2]
Source link

Adobe clarifies terms of service following recent controversy, says it doesn’t use its customer work to train AI

0
[ad_1]

Adobe has been caught in a controversy recently about its new terms of service update for its Cloud service. Artists were getting angry to find out that reportedly, the new terms of service allowed Adobe to allegedly do what it wanted with its users’ projects. Adobe then vaguely stated that the terms have always been this way in a statement to AppleInsider.However, it wasn’t enough to calm people down, and this initial statement said nothing about training AI and was pretty vague to appease minds. Then, Adobe issued a blog post with clarification on its terms. 

The blog post specifically says that Adobe does not train Firefly Gen AI models on customer content and that the company will never assume ownership of the work of a customer.

Also, the blog post indicates when access is needed for Adobe applications, listing scenarios such as opening and editing files, creating thumbnails, or a preview for sharing. Also, access is needed for cloud-based features such as Photoshop Neural Filters, Liquid Mode, or Remove Background. Also, Adobe will be monitoring (with tech or human) content stored on Adobe servers for illegal content (such as CSAM).

However, the statement has not calmed everyone down. There are talks on social media as reported by AppleInsider claiming that Adobe got caught with their hands in the cookie jar. Personally, I believe it’s always essential to address uproar, especially now that everybody is semi-excited for AI and semi-scared. And especially when it comes to privacy.

[ad_2]
Source link

Managed service providers in cyber attacks

0
[ad_1]

If someone decides to rob a bank in 2024 without having slept in a cryochamber for 40 years, they probably will not be searching for a revolver. Instead, they might turn to cyber crime (or reconsider their plans altogether). They could take it a step further – not just targeting one bank or going one by one, but attacking them en masse. By hacking into a managed service provider (MSP), they can gain access to the infrastructure of numerous client organizations, including banks.

The example might seem humorous, but the reality is grim. Cyber criminals are increasingly targeting MSPs, and this rising threat is being reported globally, including in the US, UK and other countries.

The role of MSPs in cyber security breaches

The abbreviation MSP refers to contractors who offer clients comprehensive management of IT products using the infrastructure-as-a-service (IaaS) model. According to IBM, the primary reason for successful attacks on MSPs is compromised credentials of both the providers’ employees and their customers. Weak and compromised passwords account for one-third of these incidents. The most commonly found user accounts on the dark net include Microsoft Outlook and WordPress.

Another significant threat is software vulnerabilities. Over the past year, the number of vulnerabilities in cloud services has tripled, increasing by almost 200%, according to IBM. Here, too, criminals exploit security flaws in Microsoft Outlook and other widely used business products. However, there are also instances where specialized applications for MSPs become problematic.

One of the most notable examples involves a vulnerability found in the ConnectWise ManagedITSync plugin. Service providers use this plugin to integrate the ConnectWise Manage automation platform with Kaseya VSA, which handles remote monitoring and asset management. The discovered defect allowed for the modification of databases, the addition of new users, granting them full permissions and assignment of any tasks. In simpler terms, criminals could remotely download malware onto the devices of MSP customers.

Although the bug was quickly fixed, other issues with Kaseya VSA surfaced later. In 2021, at least three major MSPs and their clients were impacted by a vulnerability. For example, in Sweden, the web services of the large retail chain Coop were compromised, forcing the company to temporarily close about 800 stores.

READ: The top 10 APAC data breaches

Blackmailing and spying

Attacks on the MSP sector often involve the same criminal groups, many of which are ransomware gangs or those who lease their rogue software through a subscription model to other black hat hackers. Sometimes, criminals demand a ransom from the provider itself, but more frequently, they target its customers. Hackers commonly threaten to leak data. To illustrate the scale, consider three incidents involving well-known gangs.

1. Black Hunt

In January 2024, an attack on Tigo Business, a market leader in mobile communications, cloud services and hosting in Paraguay, came to light. The provider was targeted by the Black Hunt ransomware group. As a result of the attack, 330 of the provider’s servers were encrypted, causing immediate failure. Consequently, the web services of more than 300 client companies were disrupted.

The Black Hunt hackers first emerged at the end of 2022 and are active in South America. Typically, the criminals gain access to corporate networks and user devices, from which they launch ransomware attacks. Additionally, in their communications with victims, they mention the possibility of selling the obtained data on the dark net.

The primary entry point for these attacks is unsecured remote desktop protocols (RDPs). Once they gain access, the criminals clear the Windows event logs on the victims’ computers, delete shadow copies of NTFS records, disable the system restore capability and terminate Microsoft Defender. All of these actions occur covertly without the user’s awareness.

2. REvil

Another ransomware group has exploited vulnerabilities in famous software – Kaseya VSA. The most notable incident involving the REvil group and MSP contractors occurred in 2021. The group claimed to have infected both Kaseya itself and other service providers using its products. According to the criminals, this resulted in a million operating systems worldwide being affected. Previously, the group executed a similar attack using Sodin ransomware. Hackers primarily targeted MSPs through the Webroot remote access console.

READ: Five ransomware gangs and their tactics (part two)

3. APT29

At the end of February 2024, the Cybersecurity and Infrastructure Security Agency (CISA) reported that the APT29 group started to specialize in attacks on cloud services. Previously, they focused on exploiting on-premises vulnerabilities.

APT29, also known as Midnight Blizzard and Cozy Bear, is believed by some security experts to be operated by the Russian Foreign Intelligence Service. Typically, this group targets government structures and organizations in the US and European countries. The incidents often result in leaks of confidential information.

Typically, criminals gain access to a victim’s network through brute force attacks. However, according to a CISA report, in attacks on cloud servers, APT29 hackers more frequently use tokens, which allow them to access accounts without needing a password. The group also often employs the multi-factor authentication (MFA) bypass technique. Once they have accessed an organization’s cloud storage, group members add new devices to it and begin reconnaissance.

Defense strategies

The principle is straightforward: the fewer IT service providers you have, the lower the likelihood of attacks stemming from them. Another obvious piece of advice: it is better to verify a contractor’s reliability in advance. This is not just about whether attackers have previously targeted them. A company might be too new to have a significant history of such incidents, yet it can be just as reliable as its competitors. Additionally, not all market players are willing to share such information about themselves.

That is why it is advised to check if the service provider has the necessary regulatory and market compliance certificates. It is important to consider both industry-specific certifications like PCI DSS and general ones like ISO 27001.

DOWNLOAD: Threat report 2024: Cyber security in the era of AI

The important thing to remember is that having a closed case with paper security does not always ensure effective data security in practice. If you are unsure, it is best to ask the provider questions that fall within their area of responsibility. These include:

1. What type of data center houses its equipment?

Sometimes, what is labeled as a data center might just be a server room within a business center. In terms of physical security, this setup is typically less strong compared to a standalone data center with a fenced area. Also check how the access system is managed, whether there is round-the-clock security and if there is indoor and outdoor video surveillance.

2. How is network security arranged?

You should be concerned not only about mandatory network segmentation, which separates the provider and client networks. It is vital to understand how DDoS protection is organized: does the attacked company get routed to a blackhole, or is the entire cloud shielded at the L3/L4 level? The latest method allows for detecting threats earlier and avoiding an abrupt shutdown of the victim’s IP addresses.

3. What identity and access management practices are implemented?

It is preferable if provider and client administrators connect to resources using MFA and through remote desktop (VDI). Additionally, it is good if the contractor not only mandates updating access credentials every 90 days but also verifies password hashes to prevent brute-force attacks.

4. What vulnerability scanners are used?

All MSPs routinely scan their internal and cloud infrastructure. However, there are instances where, as per the agreement, some resources provided by the contractor to the client are also subjected to checks.

5. How is monitoring conducted and logs collected?

Many providers use logs from cloud software and devices to promptly detect anomalies and mitigate potential risks for themselves and their clients. This data facilitates faster incident response and investigations.

6. Are backups created and stored at a remote location?

It is important not to confuse backups with disaster recovery orchestration (and there are such misconceptions in practice). In the case of ransomware, there is a risk of replicating the same encrypted data to the backup site as on the primary one. Ensure your MSP backup strategy addresses these concerns comprehensively.

7. Do they provide training for staff?

Since people are the weakest link, staff training should focus on things like recognizing social engineering tactics. They should practice strong password habits and safe browsing. Employees also need to know how to report security incidents promptly.

All the mentioned criteria represent the basic standards that a trustworthy service provider should meet. Ideally, the provider goes beyond regulatory and client demands. For example, conducting pre-incident response (Pre-IR) tests is an optional step. If the provider takes this initiative and achieves positive results, it demonstrates a heightened commitment to safety concerns.

While there are many MSP-related threats out there, the reality is not as dire as one might think. Similar to other industries, only a small percentage of companies fall victim to hackers. In most cases, service providers employ strong measures and protections that prove effective across the board. If you happen to be that daring cyber criminal attempting to breach a reliable service provider, I pity your dark endeavors, but chances are, achieving your goal will be a tough nut to crack.



[ad_2]
Source link

Microsoft Details On Using KQL To Hunt For MFA Manipulations

0
[ad_1]

It is difficult to secure cloud accounts from threat actors who exploit multi-factor authentication (MFA) settings.

Threat actors usually alter compromised users’ MFA attributes by bypassing the requirements, disabling MFA for others, or enrolling rogue devices in the system.

They do so stealthily, mirroring helpdesk operations and making it hard to notice the noise of directory audit logs.

To protect themselves against this insidious attack vector on clouds, organizations need to strengthen monitoring and controls around MFA configuration changes.

Cybersecurity researchers at Microsoft recently detailed using the KQL (Kusto Query Language) to hunt for MFA manipulation.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

KQL Hunt For MFA Manipulations

Microsoft Entra audit logs record MFA setting changes, creating two entries: one with a descriptive activity name but lacking details and another “Update User” event showing modified properties in between much noise. 

Analyzing these in the Entra portal is difficult due to data volume, especially for large tenants. However, Kusto Query Language (KQL) can simplify this task. 

The cybersecurity analysts provided ready-to-use KQL queries for Azure Log Analytics and Microsoft Defender 365 Advanced Hunting to help analyze and detect MFA configuration changes in your own tenant.

Data flow of logs related to account manipulation (Source – Microsoft)

This allows enhanced monitoring even if audit logs are only retained for 30 days by default.

There are 3 MFA properties, and here below we have mentioned them:-

  • StrongAuthenticationMethod
  • StrongAuthenticationUserDetails
  • StrongAuthenticationAppDetail

The aim is to detect alterations in a user’s registered MFA and default methods.

Researchers used KQL to filter out entries from the logs that may have timestamps, actors, and targets alongside their changed, old, and new values. Rows are generated for multiple changed properties.

The results indicate modified MFA settings by certain users, the people who altered them, and where further investigation should concentrate.

Security analysts compare OldValue and NewValue to detect changes in MFA details like added or modified emails and phone numbers. The output shows examples that may or may not be expected. 

To hunt manipulations, they extend the query to look for MFA details added across multiple users within a timeframe, surfacing potentially rogue email addresses or phone numbers provisioned altogether. 

They can also monitor for users switching phone numbers to a different country code by checking if the first 3 characters changed between old and new values. 

These queries allow for identifying suspicious MFA configuration changes at scale.

DeviceName and DeviceToken identify devices registered for Authenticator App logins. Contrasting the OldValue and NewValue shows when users add or remove the devices. 

Checking DeviceToken across users detects if one device is registered across multiple accounts, potentially indicating compromised accounts used by an attacker to persist multi-factor access. 

While sometimes done by IT admins, reusing devices across accounts is generally insecure unless both belong to the same user.

As multi-factor authentication (MFA) becomes more widespread, attackers increasingly focus on MFA for initial access obtained through token hijacking or stealing and social engineering attacks.

Account authentication methods are frequently changed after a first compromise.

Knowing about Microsoft Entra Audit Logs of MFA modification events will help detect any suspicious activities related to MFA, such as illegal scenarios, across your organization, leading to quick investigation and remediation.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

Super Mario game used to spread malware

0
[ad_1]

A Trojanized installer for the popular Nintendo fan game Super Mario Forever has been used to spread malware.

This discovery was made cyber security company Cyble. Cyble’s researchers found that malicious actors were spreading a Monero (XMR) miner, a SupremeBot mining client and an open-source Umbral stealer all bundled with a legitimate installer for Super Mario Forever. 

Once successfully installed on a device and the game is launched, the malware then secretly executes malware files on the infected device. The XMR miner uses the infected device to mine for the cryptocurrency Monero. The miner operates discreetly in the background processes of the device, meaning the unauthorized mining is hidden from the victim.  
 
The XMR miner also harvests data from the victim’s computer, including the computer name, username, graphics processing unit and central processing unit and transfers it to a command and control center.

The SupremeBot mining client executes processes on the infected device to retrieve and execute malicious data-stealing software from a command and control center to the device. This then unloads the Umbral stealer onto the device’s process memory. The Umbral stealer then rapidly collects data off the device and sends it to the malicious actor who uploaded the Trojanized software via instant messaging platform Discord using webhooks.

Cyble noted that the Umbral stealer can execute the following processes:

  • Capturing screenshots  
  • Retrieving browser passwords and cookies  
  • Capturing webcam images  
  • Obtaining telegram session files and discord tokens  
  • Acquiring Roblox cookies and Minecraft session files  
  • Collecting files associated with cryptocurrency wallets.

Together, this malicious payload bundle can significantly impact victims, both monetarily via stolen cryptocurrency or fraudulent bank transfers and materially, through the impact crypto mining will have on their device. This is because crypto mining massively disrupts a system’s processes as well as depleting its resources.

Learn more about Trojanized malware with Cyber Security Hub’s ultimate guide to malware. 



[ad_2]
Source link

OnePlus 13 to get a camera boost, include three 50MP cameras

0
[ad_1]

The OnePlus 13 will include three 50MP cameras based on a new rumor that surfaced online. This information comes from a well-known tipster, Digital Chat Station. He’s usually spot on, so we have no reason to doubt this info.

The OnePlus 13 will get a camera boost, and include three 50MP cameras on the back

The tipster said that the phone will feature an improved periscope telephoto camera. It will have a 50-megapixel unit, and 3x optical zoom. That camera will also come with Hasselblad boost.

As a reminder, the OnePlus 12 includes a 64-megapixel periscope telephoto camera with 3x optical zoom. That’s not the only camera that will see a change, however. The ultrawide unit will also be a 50-megapixel unit, instead of a 48-megapixel camera.

We’re still not sure what sensors will OnePlus use, as that’s a rather important detail. The main camera will stay a 50-megapixel unit, but OnePlus could end up using a different sensor. That detail is still under wraps.

OnePlus could end up using the Sony LYT-900 camera sensor

The OnePlus 12 uses Sony’s LYT-808 sensor for the main camera. That sensor is compelling, but it’s not as good as the Sony LYT-900 used by the OPPO Find X7 Ultra. Will the OnePlus 13 get a boost in that regard and use the LYT-900? It’s a possibility.

The device will be fueled by the Snapdragon 8 Gen 4. That’s a given. It will actually become one of the first smartphones to use that chip. The OnePlus 13 is expected to become official in November, at least in China.

The phone is also rumored to include a redesign, with a different camera island on the back. A 6,000mAh battery will allegedly also be included. The phone could lose wireless charging, though, unfortunately. It remains to be seen, but that’s what’s rumored at the moment.


[ad_2]
Source link