Google Maps update improves Android Auto navigation experience with 3D building syncing

0
[ad_1]
Google has continually enhanced Maps, improving our navigation experiences. The most recent Android update brings a significant improvement, especially for users who use Android Auto for directions while driving. The new update is centered around 3D buildings and their representation in Google Maps.
In the past, turning off the 3D buildings feature in Google Maps on your Android device did not affect Android Auto. Even if you disabled the feature on your phone, you would still see 3D buildings while using Android Auto, as it had its own separate setting for displaying them.

This latest update (Google Maps beta v11.125.0100), as spotted by 9to5Google, changes that. Now, when you toggle the “Show 3D buildings” setting within your Google Maps app, it seamlessly syncs with your Android Auto settings. If you turn it off on your phone, it also turns off in your car’s navigation view.

Image Credit: 9to5Google

This small change makes the user experience much smoother and easier. You no longer have to go to two different places to adjust the settings for a feature. As noted by the source, this update aligns with how Google Maps and CarPlay work on Apple devices, creating a more consistent experience across platforms.
Just remember, if you make changes to the 3D building settings while using Android Auto, they won’t show up on your car’s display right away. The settings sync when you first connect your phone to Android Auto. And keep in mind, this update is currently being rolled out in beta, so it might take a while before everyone gets it. Google often makes updates to its widely-used Maps application, and even a minor adjustment like this can have a noticeable impact on everyday usage. The recent modification demonstrates a dedication to enhancing the navigation experience on Android Auto, helping to make those extended car journeys a bit more seamless.

[ad_2]
Source link

Email Security Awareness Training – Empowering MSPs to Protect Clients

0
[ad_1]

In today’s digital landscape, email security has become a critical concern for businesses of all sizes. As cyber threats continue to evolve, it’s essential for Managed Service Providers (MSPs) to equip their clients with the necessary tools and knowledge to safeguard their email communications. That’s where TrustiFi’s Email Security Awareness Training comes into play.

Email has long been a prime target for cybercriminals, with phishing, malware, and other email-based attacks posing a significant risk to organizations.

Employees, often the first line of defense, can inadvertently expose their companies to these threats through simple mistakes or lack of awareness.

Empowering MSPs to Train and Protect

TrustiFi’s innovative solution empowers MSPs to provide their clients with comprehensive email security training and protection.

The module offers a user-friendly platform that allows MSPs to easily deploy and manage email security awareness programs, ensuring their clients’ employees have the knowledge and skills to identify and mitigate email-based threats.

*Gartner, “Market Guide for Email Security“, 13 February 2023, Ravisha Chugh, Peter Firstbrook, Franz Hinner. Use of Gartner, Inc. and/or its affiliates’ U.S. and international trademark and service mark is with permission. We reserve all rights. Gartner does not recommend technology users choose vendors with the highest ratings or other designations. Gartner research articles are views, not facts. Gartner disclaims all guarantees, including merchantability and fitness for a particular purpose, for this research.

Key Features of the Trustifi Email Security Awareness Training

  1. Interactive Training: The module features engaging, interactive training modules that cover a wide range of email security topics, from recognizing phishing attempts to implementing best practices for email hygiene.
  2. Simulated Phishing Attacks: MSPs can simulate phishing attacks to test their clients’ employees’ responsiveness and identify areas for improvement, helping to strengthen their overall email security posture.
  3. Reporting and Analytics: The module provides detailed reporting and analytics, allowing MSPs to track their clients’ progress, identify areas of concern, and measure the effectiveness of their email security awareness efforts.
  4. Customization: The Email Security Awareness training can be tailored to meet the specific needs and branding requirements of each MSP and their clients, ensuring a seamless integration into their existing security solutions.

The Benefits of Email Security Awareness Training

Email security awareness training from Trustifi equips individuals with the knowledge and skills to identify and mitigate these threats.

By educating employees on best practices for email usage, organizations can significantly reduce the risk of successful cyber attacks. Some of the key benefits of such training include:

  1. Improved Threat Detection: Trained employees are better equipped to recognize the signs of phishing attempts, malicious attachments, and other email-based threats, allowing them to take appropriate action to protect themselves and the organization.
  2. Reduced Vulnerability: By instilling a culture of email security awareness, organizations can minimize the likelihood of successful cyber attacks, which can have far-reaching consequences.
  3. Enhanced Compliance: Many industries have strict regulations regarding the handling of sensitive information. Email security awareness training can help organizations maintain compliance with these standards, reducing the risk of costly fines and legal penalties.
  4. Increased Productivity: When employees feel confident in their ability to navigate email securely, they can focus on their core responsibilities without the constant worry of potential cyber threats.

Empowering MSPs, Protecting Clients

By leveraging Trustifi’s Email Security Awareness Module, MSPs can empower their clients to take a proactive approach to email security.

By educating employees and testing their responsiveness, MSPs can help their clients reduce the risk of successful email-based attacks, ultimately safeguarding their businesses and protecting their valuable data.

Don’t let your clients fall victim to email-based threats. Explore how TrustiFi’s Email Security Awareness Module can help you strengthen your clients’ email security and position your MSP as a trusted partner in the fight against cyber threats.

Implementing Effective Email Security Awareness Training

Effective email security awareness training should be tailored to the specific needs and challenges of the organization. This may include:

  • Comprehensive Curriculum: The training should cover a wide range of topics, such as password management, identifying phishing attempts, and responding to suspicious emails.
  • Engaging Delivery: The training should be presented interactively and engagingly, using a variety of methods such as videos, simulations, and real-world case studies.
  • Ongoing Reinforcement: Email security awareness should be an ongoing process, with regular refresher training and updates to keep employees informed of the latest threats and best practices.
  • Measurable Outcomes: Organizations should track the effectiveness of their training program, using metrics such as the reduction in successful phishing attempts and the increase in employee reporting of suspicious emails.

By investing in email security awareness training, employees are empowered to defend themselves against cyber attacks, improving business security and resilience. Request a free demo here.


[ad_2]
Source link

Google Play Store purchases will use biometric authentication soon

0
[ad_1]

Google will give you the option to use biometric authentication when making purchases on the Google Play Store. This will be an alternative to using the synced Google account password. The Android OS developer has started sending out email notifications alerting Android smartphone users about the upcoming change.

Google Play Store will let you use biometric authentication to authorize payments

Google has started sending out emails to Android smartphone and smart device owners. The email is reportedly encouraging users to switch on biometric authentication for purchases made on the Play Store. The email states:

“On Google Play, you can set biometrics (fingerprint or face) as your purchase verification method on mobile devices that have biometric capability. If you set biometrics, it means you’ll be asked to verify it’s you with biometrics each time you make a purchase through Google Play.”

Google hasn’t switched over to biometric authentication entirely. Moreover, the company isn’t flipping the switch for everybody. Instead, Google has indicated that the change will take place over the next few weeks.

“In the coming weeks, there will be a change in how you confirm your setting when you choose biometric verification. For mobile devices, when you’re asked to confirm this setting, you’ll use your fingerprint or face instead of your Google Account password.”

Is Google making biometric authorization mandatory?

The email from Google states that switching on biometric authentication is voluntary. In other words, the search giant is merely urging Android device users to adopt a better and more secure method of authorization.

Google has been offering biometric authorization support for about 10 years now. Simply put, using a registered fingerprint or face to unlock a supported Android device and authorize transactions isn’t new. However, it appears Google is streamlining and simplifying the process, and this does enhance convenience. Incidentally, Google recently mandated every Google Wallet transaction would need authorization.

Opting to authorize with just a glance or a thumbprint is indeed way more convenient than typing in a password. However, Google has warned about the pitfalls of relying solely on biometric authentication.

Android smartphone users often register multiple fingerprints, including those of their spouses and children. Needless to say, this is risky. Moreover, with Google pushing hard for biometric authorization, anybody could authorize a payment with their registered fingerprint.

Hence, moving forward, it would be wise to limit fingerprint registration to responsible adults. Meanwhile, children could be given devices on which biometric authentication is disabled.


[ad_2]
Source link

Moto Razr 2024 Leaks Ahead of Launch, Certification Hints at Imminent Release

0
[ad_1]

Last year’s Moto Razr+ was one of the most popular foldable smartphones in various markets. The clamshell handset offered a large outer screen and a durable design, which were one of the key reasons for its success. Now the company is planning to launch the Moto Razr 2024 soon. Ahead of the launch, the Moto Razr 2024 leaked via the database of a certification agency in China.

The Moto Razr 2024 has been certified by the Radio Certification agency in China

A new Motorola smartphone with the model number XT2453-2 has been spotted in the Radio Certification agency’s database by Gizmochina. Notably, a previous Moto Razr 2024 leak indicated that this will be the model number of the device for the US market.

Apart from the model number, the certification database hasn’t revealed any other details about the Moto Razr 2024. However, since the device has passed the radio certification, its launch seems to be imminent. It’s worth mentioning that the company may launch the phone as the Moto Razr+ 2024 instead in select markets.

The Razr 2024 will retain the design of its predecessor, including a large outer display

A recent Moto Razr 2024 leak revealed the design of the clamshell smartphone from all angles. It appears that Motorola’s next-gen foldable offering will have a design similar to its predecessor. The phone will continue to offer a massive outer display. It covers almost every part of the front of the device and even extends past the camera module.

Like the Moto Razr+ 2023, it will also have a punch-hole design on the front in the unfolded mode. One of the variants of the upcoming Moto Razr will be available in a dual-tone gray color hue. Once closed, some of the gray material of the rear will be visible on the front. Overall, it will be one of the best-looking foldable smartphones on the market.

Unfortunately, not many details regarding the specs of the Moto Razr or Moto Razr+ 2024 are available at the moment. However, the previous leak did suggest that it will have improved performance and battery life than the predecessor, thanks to the new Snapdragon processor. The brand hasn’t yet revealed when it will be launching the new Razr or Razr+ foldable smartphone.

Motorola Moto Razr+ 2024 radio certification


[ad_2]
Source link

Google says trigger-happy “Circle to Search” will be improved and Search and Lens results merged

0
[ad_1]

Google aims to streamline the way we search for information. We all know the handy Google search bar, the Assistant button, and now we have “Circle to Search.” It’s a great idea in theory, but like any new feature, it can be under-utilized and definitely has some kinks to work out – namely, it triggers a little too easily. Fortunately, Google is aware of the issue and promises improvements.Let’s rewind a bit. Circle to Search launched with the Samsung Galaxy S24, and it leverages some of Google Lens’s visual search magic. The premise is simple: long-press your navigation bar or home button, circle what you want to know more about, and watch your search results appear.

The main problem with the feature right now is that it is too easy to accidentally launch it when you’re navigating your phone using the familiar navigation bar gestures. While that bar is pretty wide, sometimes what you’re actually trying to do is go to the home page, not initiate a search. Google knows this, and in the recent “Made by Google” podcast, Erin Lynch and Alistair Pott — who worked closely with the team that made “Circle to Search” — admitted there are improvements to be made (thanks to 9to5Google for the tip).


It works, but not without hiccups

Google says Circle to Search depends on Google Lens for the tough stuff like image searches and text recognition. Their ultimate goal is to make the feature less prone to accidental triggers so that it only launches when you really want it to. To that, Erin Lynch added:


Big plans are in the works, even though changes might take a while. Google wants to add features like real-time translation and merge Lens and Search results for a super-powered tool. Lynch and Pott both expressed their hopes that the development process leads to a seamless user experience. The team behind Circle to Search has clearly worked hard on accuracy, especially for text copying, which seems to be a popular use for the tool internally, and they hope that will catch on with the users as well.

With fixes coming and even more possibilities in the works, Circle to Search looks like it’s a feature Google plans to stick with. It has the potential to change how we interact with information on our screens, but in its current form, it is not as popular as Google wants it to be. Now that it’s spreading to more devices, we’ll have to see how Google grows its capabilities.

[ad_2]
Source link

Personal Data Exposed in Massive Global Hack

0
[ad_1]

In a digital age where information is the new currency, the recent global hack has once again highlighted the urgent need for enhanced cybersecurity measures.

The breach was identified as Midnight Blizzard, from the Russian state-sponsored actor known as NOBELIUM. It has affected Millions of individuals and government agencies worldwide, underscoring the far-reaching consequences of cyberattacks and the critical importance of protecting sensitive information.

The Scope of the Breach

The scale of the global hack is staggering. Hackers gained unauthorized access to databases containing a wealth of personal data, including financial records, social security numbers, email addresses, and passwords.

The exposed information poses a significant risk of identity theft, financial fraud, and other forms of cybercrime.

The breach has impacted individuals across various sectors, including government agencies, businesses, and private citizens, highlighting the pervasive nature of cyber threats.

Implications for Individuals

The fallout from a hack can be devastating for individuals whose data has been compromised.

Identity theft, in particular, poses a significant threat. Hackers use stolen information to open fraudulent accounts, make unauthorized purchases, or even commit acts of impersonation.

Moreover, the exposure of sensitive personal information can erode trust and privacy, leaving individuals vulnerable to exploitation and manipulation.

Response and Accountability

After the breach, affected organizations must take swift and decisive action to mitigate the damage and restore trust.

This includes implementing robust cybersecurity measures, notifying affected individuals, and cooperating with law enforcement agencies to identify and apprehend the perpetrators.

Additionally, those responsible for the breach must be held accountable, whether they are individuals, criminal organizations, or state-sponsored actors. Holding perpetrators accountable prevents future attacks and conveys that protecting personal data is paramount.

Safeguarding Privacy in an Era of Cyber Threats

While the global hack serves as a sobering reminder of the dangers posed by cyberattacks, it also underscores the importance of proactive cybersecurity practices.

Individuals and organizations alike must remain vigilant in safeguarding sensitive information and adopting best practices for data protection.

This includes using strong, unique passwords, encrypting sensitive data, regularly updating security software, hiring the right cybersecurity company for monitoring, and being cautious when sharing personal information online.

Moreover, governments and regulatory bodies must enact robust data protection laws and regulations to hold organizations accountable for safeguarding personal data and provide recourse for individuals affected by breaches.

Hack Aftermath

The recent global hack exposed personal data, serving as a wake-up call for individuals, businesses, and governments alike. Cybersecurity must be a top priority in an interconnected world where data is increasingly valuable and vulnerable.

That is why Axios Security Group believes that by implementing robust security measures, fostering a culture of accountability, and advocating for more robust data protection laws, can be implemented together to mitigate the risks of cyber threats and safeguard the privacy and security of personal information.

Only through collective action can we effectively confront cybercrime and ensure a safer, more secure digital future.

About Axios Security Group

Axios Security Group is a trusted leader in comprehensive security solutions, offering organizations physical and digital protection.

With a dedicated team of experts, Axios created tailored security strategies to safeguard assets, personnel, and data.

Its physical security services range from on-site personal security to cutting-edge surveillance technologies, while our cybersecurity experts provide robust digital defenses, including threat detection and incident response.

Axios collaborates closely with each client to ensure our solutions align with their unique needs, industry regulations, and budgetary constraints.

Axios Security Group provides a vCSO (Virtual Security Officer) program in addition to physical and cyber security.

A vCSO (Virtual Chief Security Officer) is a C-suite-level security expert who enhances your company’s security. They bring strategic vision, devising comprehensive security plans encompassing digital information and physical asset protection.

By collaborating closely with your leadership team, a vCSO tailors security solutions to your unique needs, aligning them with your organizational goals and industry regulations.

This approach ensures that your organization is well-prepared to navigate the ever-evolving landscape of security challenges, creating a robust, adaptable, and resilient security infrastructure.

A vCSO provides all the same security expertise and protections for your organization at a 1/3 of the cost of a full-time CSO (Chief Security Officer.)

Contact us to learn how Axios Security Group can protect one of your most considerable corporate assets.

Contact
Contributor
Robin Carter
News Break
[email protected]
8004853983

[ad_2]
Source link

Google is fixing the Circle to Search issue

0
[ad_1]

One of Google‘s noteworthy additions to Google Search is the new Circle to Search feature. It was unveiled in January this year with the Galaxy S24 Series with it hitting the Pixel 8 series a little later. It’s now also available on some of the older Pixel and Galaxy devices including the Google Pixel Fold (Review).

After Voice Search and Google Lens, Circle to Search seems to be the next big upgrade to Google Search that makes it much more easy and convenient to access. To trigger the feature, you just have to long press on the Navigation Bar or the Home button at the bottom of your compatible Android device. An overlay of Circle to Search appears on the screen where you can quickly select both text and images and access Google Search from any application.

Gesture navigation users are facing issues with Circle to Search.

With the button activation, the development of Circle to Search has replaced Android’s Assistant activation. Now users have to use the hotword, power button, or the app shortcut for the purpose. But, with the gesture navigation setting, users are facing issues of unwanted triggering of Circle to Search.

Many people including Reddit user throwitaway0192837 and Abner Li from 9to5Google have previously reported about the issue. Now, it appears that Google has been listening to the feedback and is working on solving the unwanted triggering of Circle to Search.

“We still have further to go, and we’re working a lot on making sure it’s triggered when you want, [and] it’s not triggered when you don’t want,” notes the latest Made by Google Podcast.

Google’s podcast talks about the development of the Circle to Search.

The podcast episode reveals that Google Lens is the product that powers this intuitive search feature. The only difference is that Circle to Search is “universally available.”

People across many teams at Google believe that Google Lens is a very capable tool and has a lot of potential. Back in January 2023, it started the development of Circle to Search. The first prototype turned out to be fascinating. The company kept it simple and created this new tool to improve the search experience. Notably, Circle to Search is only available on Android, meaning you cannot use the feature on different platforms, even if your device uses Google to search.

As the Made by Google Podcast discusses, this tool is great for copying not just images but also text, which you can easily translate and search with. You can also select and search with both images and text together.


[ad_2]
Source link

moto buds+ officially launched with dual drivers & Dolby Atmos

0
[ad_1]

Today, Motorola introduced its latest smartphones in the Edge series lineup. The brand is announcing three devices in the family including the Edge 50 Fusion, Edge 50 Pro, and Edge 50 Ultra. Alongside the new smartphones, the moto buds+ officially launched globally, apart from the moto buds. The former is the company’s most high-end and expensive wireless earbuds to date. The moto buds+ features dual drivers, Dolby Atmos, Sound by Bose Experience, Dynamic ANC, and a water-repellent design. Notably, the moto buds+ is also equipped with Motorola’s CrystalTalk AI technology

The moto buds+ sport serious ANC, Hi-Res Audio, and a triple-mic setup

The moto buds+ flagship earbuds flaunt Hi-Res Audio and serious active noise control. The wearable sports the Dynamic Active Noise Cancellation technology. There’s a dedicated Moto Buds app for smartphones, which allows you to customize the overall listening experience. The app allows users to adjust the Dynamic ANC settings to different levels. It also allows enabling the Active Adaptive Mode, which can automatically adjust noise cancellation settings based on the noise around you.

The other moto buds+ features include dual dynamic drivers. Motorola has partnered with Bose to integrate the Sound by Bose tech into the buds+ for advanced EQ tuning. The wearable has a triple-microphone setup and Motorola’s CrystalTalk AI technology. Notably, the latter offers an anti-wind algorithm to provide clear phone calls and video calling experience, even in noisy environments.

Furthermore, the moto buds+ wireless earbuds are loaded with the Dolby Head Tracking functionality. It automatically recalibrates the audio output by following your head movements. Notably, the audio accessory offers up to eight hours of playtime on a single charge. It can provide up to 38 hours of usage, thanks to the additional battery in the charging case.

Lastly, the buds+ is impervious to splashes, spills, and light rain, thanks to the water-repellent design. The company hasn’t yet revealed the exact IP rating of the earbuds.

The moto buds offers longer playtime and Dynamic ANC at an even affordable price tag

The moto buds is equipped with a powerful 12.4mm dynamic driver to provide an immersive Hi-Res Audio listening experience. Despite being more affordable, this one also flaunts Dynamic ANC, Adaptive Mode, and Transparency Mode. These settings can be configured on the wearable using the Moto Buds app on your smartphone. It also offers the CrystalTalk AI technology to provide a clear calling experience in noisy environments.

Notably, the moto buds offer a higher up to nine hours of audio playback on a single charge. Thanks to the fast charging tech, it can provide up to two hours of listening in just 10 minutes of charge.

The buds & buds+ will be available starting from $63

The moto buds+ is priced at $129.99 and comes in Forest Grey and Beach Sand color variants. As for the regular moto buds model, it will set you back by €59 or approximately $63. This one comes in four colorways – Starlight Blue, Glacier Blue, Coral Peach, and Kiwi Green.

The buds+ is already available on the company’s website in the US. The moto buds variant is available in Europe starting today. It’s unlikely to hit the US market anytime soon.


[ad_2]
Source link

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group – Latest Hacking News

0
[ad_1]

In a digital age where information is the new currency, the recent global hack has once again highlighted the urgent need for enhanced cybersecurity measures.

The breach was identified as Midnight Blizzard, from the Russian state-sponsored actor known as NOBELIUM. It has affected Millions of individuals and government agencies worldwide, underscoring the far-reaching consequences of cyberattacks and the critical importance of protecting sensitive information.

The Scope of the Breach

The scale of the global hack is staggering. Hackers gained unauthorized access to databases containing a wealth of personal data, including financial records, social security numbers, email addresses, and passwords. The exposed information poses a significant risk of identity theft, financial fraud, and other forms of cybercrime. The breach has impacted individuals across various sectors, including government agencies, businesses, and private citizens, highlighting the pervasive nature of cyber threats.

Implications for Individuals

The fallout from a hack can be devastating for individuals whose data has been compromised. Identity theft, in particular, poses a significant threat. Hackers use stolen information to open fraudulent accounts, make unauthorized purchases, or even commit acts of impersonation. Moreover, the exposure of sensitive personal information can erode trust and privacy, leaving individuals vulnerable to exploitation and manipulation.

Response and Accountability

After the breach, affected organizations must take swift and decisive action to mitigate the damage and restore trust. This includes implementing robust cybersecurity measures, notifying affected individuals, and cooperating with law enforcement agencies to identify and apprehend the perpetrators. Additionally, there must be accountability for those responsible for the breach, whether they are individuals, criminal organizations, or state-sponsored actors. Holding perpetrators accountable prevents future attacks and conveys that protecting personal data is paramount.

Safeguarding Privacy in an Era of Cyber Threats

While the global hack serves as a sobering reminder of the dangers posed by cyberattacks, it also underscores the importance of proactive cybersecurity practices. Individuals and organizations alike must remain vigilant in safeguarding sensitive information and adopting best practices for data protection. This includes using strong, unique passwords, encrypting sensitive data, regularly updating security software, hiring the right cybersecurity company for monitoring, and being cautious when sharing personal information online. Moreover, governments and regulatory bodies must enact robust data protection laws and regulations to hold organizations accountable for safeguarding personal data and provide recourse for individuals affected by breaches.

Hack Aftermath

The exposure of personal data in the recent global hack serves as a wake-up call for individuals, businesses, and governments alike. Cybersecurity must be a top priority in an interconnected world where data is increasingly valuable and vulnerable. That is why Axios Security Group believes that by implementing robust security measures, fostering a culture of accountability, and advocating for more robust data protection laws, can be implemented together to mitigate the risks of cyber threats and safeguard the privacy and security of personal information. Only through collective action can we effectively confront the challenges posed by cybercrime and ensure a safer, more secure digital future.

About Axios Security Group

Axios Security Group is a trusted leader in comprehensive security solutions, offering organizations physical and digital protection. With a dedicated team of experts, Axios created tailored security strategies to safeguard assets, personnel, and data. Its physical security services range from on-site personal security to cutting-edge surveillance technologies, while our cybersecurity experts provide robust digital defenses, including threat detection and incident response. Axios collaborates closely with each client to ensure our solutions align with their unique needs, industry regulations, and budgetary constraints.

Axios Security Group provides a vCSO (Virtual Security Officer) program in addition to physical and cyber security. A vCSO (Virtual Chief Security Officer) is a C-suite-level security expert who enhances your company’s security. They bring strategic vision, devising comprehensive security plans encompassing digital information and physical asset protection. By collaborating closely with your leadership team, a vCSO tailors security solutions to your unique needs, aligning them with your organizational goals and industry regulations. This approach ensures that your organization is well-prepared to navigate the ever-evolving landscape of security challenges, creating a robust, adaptable, and resilient security infrastructure. A vCSO provides all the same security expertise and protections for your organization at a 1/3 of the cost of a full-time CSO (Chief Security Officer.)

Contact us to learn how Axios Security Group can protect one of your most considerable corporate assets.

 

Contact

Contributor

Robin Carter

News Break

[email protected]

8004853983


[ad_2]
Source link

Leaked renders show the HMD Pulse

0
[ad_1]

A while back, we got the news that Finnish smartphone company HMD wanted to strike out on its own and make its own HMD-branded smartphones. So far, we’ve seen a few leaks of what the company is planning on doing, but the leaks keep coming. Thanks to a new report, we just got our first look at the HMD Pulse, and it looks pretty nice. This comes after the company showed off the return of several nostalgic Nokia phones.

Right now, we pretty much know that HMD is going all in on smartphones, being shown off in several leaks. They all look pretty par for the course. The HMD phones resemble typical mid-range smartphones, and that is bittersweet. Being mid-range smartphones, they lose the excitement factor. However, launching affordable devices in a market dominated by Apple and Samsung is a smart move.

We have a new leak of the HMD Pulse

Looking at the images of the HMD Pulse, it’s evident that the company is going for a more industrious look. The overall shape of the phone is a bit boxy with relatively sharp corners. Also, there’s a boxy rectangular camera package on the back. It houses two camera sensors along with the flash.

As for the rest of the back, we see the HMD logo placed squarely in the middle of the phone. It appears that the back of the phone will be made from a textured material. The material resembles colored metal, but it’s unlikely that it will be made from metal. We’re certain that it’s just going to be textured plastic.

Up front, we see the 6.56-inch display. Rumor has it that it will be an IPS LCD display with a 720p+ resolution. This places it comfortably in the budget phone category. The display will have a center-mounted punch hole and relatively small bezels. They aren’t exactly tiny, but they are definitely smaller than most other mid-rangers.

The sides of the phone are flat with the SIM tray on the left side and the volume/ power buttons on the right. The power button appears to be a little too thin to double as a fingerprint scanner. So, this leaves open the possibility of this phone having an under-display fingerprint scanner. However, that remains to be seen.

As for the color options, we’re not sure if HMD has any weird or creative names for the colorways. However, looking at the renders, it appears that there will be a black, blue, and pink option for colors.

Rumored specs

Right now, there aren’t too many specs on the rumor mill. However, it appears that this phone will be powered by an octa-core processor. We’re not certain which one, however.

As for the camera, the HMD Pulse may come with a 13-megapixel main camera. On the render, we see the text “AI dual camera”, so we expect this camera to tout some sort of AI technology. However, that’s nothing special, as companies have been doing this for years.

Rounding out the rumored specs, this phone may come with a 5000mAh battery. If the chip is efficient, then the HMD Pulse might be a two-day phone. We’re still waiting for more information about this device to come to the surface, so you’ll want to stay tuned.


[ad_2]
Source link