Google has removed nine apps from its Play store after researchers showed that they sneakily stole users’ Facebook login credentials. The apps were hidden under names that sounded like everyday utility tools and apps. These include Rubbish Cleaner and Horoscope Daily. According to a report, the malicious apps had approximately 5.9 million combined downloads on the Google Play store — with PIP Photo alone having 5.8 million downloads — and had five different variants of malware. Google had earlier removed three apps meant for children over privacy violations.
Dr. Web, an antivirus service, reports that their malware analysts discovered nine malicious apps – Processing Photo, App Lock Keep, Rubbish Cleaner, Horoscope Daily, Horoscope Pi, App Lock Manager, Lockit Master, Inwell Fitness, and PIP Photo. These apps reportedly acted as trojan malware and stole users’ Facebook login credentials after providing users the options to disable ads by logging in via their social media accounts. Dr. Web’s report was spotted by Ars Technica.
A Google spokesperson told Ars Technica that they had also banned the app developers of all of the nine apps from Google Play store, which would stop these developer accounts from publishing any new apps on the marketplace. This is a positive step by Google, but a new developer account, under a different name, can be created with a nominal fee of $25 (roughly Rs. 1,900).
Users are advised not to download any app from an unknown developer, regardless of how many downloads the app might have. In this case, PIP Photo had the maximum downloads at 5.8 million, followed by Processing Photo at 500,000 downloads. Anyone who has downloaded these apps should thoroughly examine their device and Facebook account for suspicious activities.
Sirisha Bandla, an Indian-origin astronaut, will be taking care of the researcher experience on the Unity22 mission, when a Virgin Galactic test flight travels to the edge of space on July 11.
Andhra Pradesh-born Bandla will be one of the six space travellers aboard ”VSS Unity” of Virgin Galactic, scheduled to take off to space on July 11 from New Mexico alongside the founder of Virgin Galactic Richard Branson.
The Telugu woman hailing from Andhra’s Guntur district who was brought up in Houston will become the second India-born woman to fly into space after Kalpana Chawla. Rakesh Sharma, and Sunita Williams were the other Indians who went into space prior to Bandla.
Taking to Twitter, the 34-year-old aeronautical engineer shared she was “incredibly honoured” to be part of the crew.
“I am so incredibly honoured to be a part of the amazing crew of Unity22, and to be a part of a company whose mission is to make space available to all,” she posted.
Former Andhra Pradesh Chief Minister N Chandrababu Naidu also shared two pictures – one featuring all five members of the crew and a solo photo of Sirisha Bandla on his official Twitter handle.
Indian-origin women continue to break the proverbial glass ceiling and prove their mettle. On July 11th, @SirishaBandla with Telugu roots is set to fly to space aboard VSS Unity with @RichardBranson and the team marking the dawn of the new space age, making all Indians proud! pic.twitter.com/oecuztDRBe
“Indian-origin women continue to break the proverbial glass ceiling and prove their mettle. On July 11th, Sirisha Bandla with Telugu roots is set to fly to space aboard VSS Unity with Richard Branson and the team marking the dawn of the new space age, making all Indians proud!,” the Chief Minister tweeted.
UK billionaire and founder of the Virgin Galactic company Richard Branson announced on June 2 that he will make a spaceflight on July 11, earlier than Amazon founder Jeff Bezos.
“I’ve always been a dreamer. My mum taught me to never give up and to reach for the stars. On July 11, it’s time to turn that dream into a reality aboard the next @VirginGalactic spaceflight,” Branson tweeted on late Thursday.
The company confirmed the information and published a video, presenting six crew members of the next spaceflight, including Bandla.
“Join us July 11th for our first fully crewed rocket powered test flight, and the beginning of a new space age. The countdown begins,” the company wrote on its Twitter page.
Bezos is also going to make a spaceflight on board the New Shepard spaceship, which is scheduled for July 20.
Nokia G20 has launched in India as the latest budget friendly offering from brand licensee HMD Global. The phone is offered in two colours and a single RAM and storage configuration. Nokia G20 sports a quad rear camera setup and a notch for the selfie camera. The phone comes with a pattern on the back and is powered by an octa-core SoC. The company says it can last up to three days on a single charge. The launch comes shortly after it was spotted on a banner ad on Amazon India, announcing the upcoming pre-orders.
Nokia G20 price in India
Nokia G20 is priced at Rs. 12,999 for the sole 4GB RAM + 64GB storage variant. It is offered in Glacier and Night colour options. The phone will be available for purchase via Nokia India website and Amazon India starting July 15. Pre-booking will start on Amazon and Nokia website from July 7 at 12pm (noon). As mentioned, prior to HMD Global’s launch press statement, the Nokia G20 was spotted on Amazon India, in a banner ad detailing the pre-order date.
Nokia G20 specifications
The dual-SIM (Nano) Nokia G20 runs Android 11 with two years of updates promised by the company. It features a 6.5-inch HD+ display with 20:9 aspect ratio and a notch for the selfie camera. Under the hood, the Nokia G20 is powered by the octa-core MediaTek Helio G35 SoC with 4GB of RAM and 64GB of internal storage. The storage is expandable via microSD card (up to 512GB).
For photos and videos, there is a quad rear camera setup on the Nokia G20 that includes a 48-megapixel primary sensor with an f/1.79 lens, a 5-megapixel sensor with an utra-wide-angle lens, a 2-megapixel macro shooter, and a 2-megapixel depth sensor. At the front, the phone features an 8-megapixel selfie shooter.
Connectivity options on the Nokia G20 include Wi-Fi, 4G, Bluetooth v5, GPS, NFC, 3.5mmm headphone jack, and a USB Type-C port for charging. Sensors onboard include ambient light sensor, proximity sensor, accelerometer (g-sensor), and gyroscope. There is a side-mounted fingerprint scanner as well. Nokia G20 is backed by a 5,050mAh battery with support for 10W charging. In terms of dimensions, the phone measures 164.9×76.0x9.2mm and weighs 197 grams. It has an IPX2 build and a dedicated Google Assistant button on the side.
According to Twitter tipster FrontTron, the Galaxy Z Flip 3 price could start at around $1,249 (~Rs 92,833) for the basic 8GB RAM and 256GB storage option. In any event, this leaked pricing suggests that the Galaxy Z Flip 3 will be $200 cheaper compared to the original Galaxy Z Flip smartphone ($1,450). Further, the tipster has cautioned us to take this piece of information with a pinch of salt. As of now, it is unclear if Samsung plans to launch the phone in any other memory configuration. Though, there are reports of an LTE model as well besides the 5G variant. As per the previous leaks, the Galaxy Z Flip 3 is expected to come in four colour options: white, black, olive green, and purple.
Despite a cheaper price tag, the Galaxy Z Flip 3 will offer various improvements over the original. The foldable is tipped to feature a larger cover display of 1.9-inch, and its inner foldable display is supposed to gain a 120Hz refresh rate. The rear of the device is said to come in a dual-tone finish with the cameras vertically aligned. An FCC filing has confirmed that the smartphone will have the latest Snapdragon 888 SoC under the hood. On the software front, it might run on OneUI 3.1.1 based on Android 11 out of the box.
With the launch date inching closer, we will likely hear more details about it in the coming weeks. What are your thoughts on Samsung Galaxy Z Flip 3 Price? Do let us know in the comments below.
Amazon on Monday got a new chief executive: Andy Jassy, the mastermind behind its lucrative cloud computing division, who succeeds company founder Jeff Bezos.
Here’s a look at the business Jassy is taking over and the challenges that await him on the job.
More than the ‘everything store’
Bezos incorporated Amazon exactly 27 years ago. The Internet bookseller he founded out of a garage has morphed into a purveyor of virtually any consumer good, online and in physical stores. It has grown far beyond even that: Jassy built an enormously profitable and market-leading business, Amazon Web Services, that runs data centres serving a wide range of corporate computing needs. Amazon is also expanding further afield into Hollywood and healthcare.
Amazon’s stock started out at $1.50 (roughly Rs. 110) per share, when adjusting for future equity splits. It now trades at more than $3,500 (roughly Rs. 2.5 lakhs) per share and is worth over $1.7 trillion (roughly Rs. 1,26,27,460 crores) total, making it one of the most valuable companies in the world.
Amazon’s annual profit almost doubled in 2020 to $21.3 billion (roughly Rs. 1,58,210 crores). That’s partly because the COVID-19 pandemic encouraged more consumers to shop online, helping the company grow revenue 38 percent to $386.1 billion (roughly Rs. 28,68,280 crores).
With size has come greater scrutiny. Long chased by global regulators on issues such as taxation and data collection, Amazon now is fending off antitrust complaints that could lead to big fines.
US President Joe Biden recently appointed a prominent tech critic, Lina Khan, to run the Federal Trade Commission, which is investigating Amazon. Though the details of the probe aren’t public, it is expected to involve Amazon’s conflict of interest as a retailer of its own products that compete with third-party merchants on its platform. Amazon has been accused of using the proprietary data of third-party vendors to make cheaper, private-label versions of their products. Amazon contests these claims.
Meanwhile, Congress is considering new antitrust laws that could alter Amazon’s business. And European regulators have been investigating a number of the company’s practices.
Challenges closer to home
Amazon also faces challenges from some of the biggest US companies. Walmart, for instance, is chasing after Amazon’s home turf with a package delivery club of its own, while Microsoft has signed deals in the cloud with top enterprises – Walmart included – to narrow the lead of Jassy’s AWS.
Jassy also faces potential disruption from within. Amazon is grappling with unionisation interest among warehouse employees and potentially other workers. Although it handily beat back an organising effort at its Bessemer, Alabama, fulfillment centre, labour groups including the Teamsters vow that the fight is only beginning.
The company likewise is hoping to maintain its allure among office staff, as some startups offer tech jobs with more flexible work schedules. The company initially said it planned an “office-centric culture,” but it soon updated guidance to requiring in-person work three days a week, in line with industry peers.
It feels almost unbelievable that after over a year of having to work from home, we have finally reached a stage when, thanks to the rising vaccination rates and other efforts by governments, life seems to be returning to almost normal. Alas, for many people this not only means an opportunity to visit a theatre or a pub after a long break, but also the looming prospect of returning to their offices.
Back in early 2020, when we first faced nationwide lockdowns, IT workers found themselves fighting for the survival of their businesses because very few companies were prepared to support a fully remote workforce. Fortunately, most were able to adapt within the first months of the pandemic. For some businesses, Covid was the decisive argument to finally embrace the cloud. For others, digital services have even become the new product. Those were truly “interesting times”.
Let’s face it: office work is no longer normal
Fast forward to June 2021 and it seems that many IT workers – especially those responsible for security – are looking forward to the impending end of lockdowns as some kind of return to normalcy, going back to the “good old times”. In reality, this might be the biggest mistake a CISO can make! Even once everyone is fully vaccinated and the remaining restrictions are lifted, the new “normal” will be nothing like pre-Covid times.
First, many people like working from home. Some are seriously planning to continue, and are even prepared to take a pay cut or move to a different company to do so. Many businesses have also appreciated the cost and time savings, to say nothing about the profound environmental impact of remote working.
Eventually, many companies will have to redesign their office spaces to put more emphasis on shared workplaces and hotdesking, as well as to cater to the sharp increase in teleconferencing and remote collaboration, even in offices.
For people in IT and cyber security, this means there is simply no going back to the old concept of perimeter security. Even the most conservative companies that were still clinging to their firewalls, VPNs and on-premise applications had to finally make a leap of faith and adopt modern, cloud-native alternatives to accommodate their remote workers and to ensure their safety and compliance outside of the traditional corporate perimeter.
Nowadays, the local area network (LAN) is the least safe part of the corporate network, and returning office workers will only make the situation worse. Masks and tests may help protect against Covid in the workplace, but what will help against ransomware and phishing attacks?
Zero trust: not a buzzword anymore, but a strategic goal
Does it mean, however, that we now need to invest in additional security tools to protect our offices from the sudden inflow of new external and internal threat actors? Well, yes and no.
The biggest enemy of security is complexity, and adding security controls specifically for office workers is a waste of money and time. A more sensible strategy is to ensure that the same security stack can protect any worker, inside and outside of the office, including employees working from home, mobile workers, contractors and other partners.
In practical terms, this means extending the definition of a remote worker to everyone within the organisation. Anyone should be able to experience the same level of productivity and protection from cyber threats inside or outside of the office, moving seamlessly between IT environments like mobile phones between cell towers. Needless to say, the most radical method of achieving this seamless behaviour is by getting rid of the very notion of a local network – the one and only holy grail of zero trust!
This buzzword has been a popular topic for discussion among IT experts for years, often leading to much confusion among people thinking they can purchase zero-trust networks as turnkey solutions. However, while this is definitely not the case, adopting a zero-trust security model is easier than many people believe, providing they have a proper long-term strategy.
In addition to deploying various technologies – which many companies might already have done precisely because of Covid – it might require companies to redesign some organisational principles or business processes as well. But the result will always lead to the overall simplification and unification of IT infrastructures, reduced costs and administration overheads, and, hopefully, increased employee productivity and satisfaction.
It’s time to retire the LAN
The first step in this strategic journey towards zero trust can be quite simple: just pretend that your office no longer has a local area network. Even if a worker is back at their old desk, treat their devices as though they were still working from home – for example, only let them connect to the guest Wi-Fi network.
Of course, if you have been relying on old-school VPN solutions for all these months, this might cause problems, but if you’re already using a cloud-based zero-trust network access (ZTNA) platform to provide secure connectivity to your corporate applications, it should work completely transparently – in or out of the office. As an added benefit, this approach will protect your legacy LAN from lateral movements of a potential malicious actor, external or internal.
The same applies to secure access service edge (SASE) solutions that deliver security capabilities directly from the cloud – even if they cannot yet fully replace your carefully configured stack of on-premise security appliances, they can probably provide 80% of protection for just 20% of the cost, in the office, at home or anywhere in between.
If there is any silver lining behind the whole Covid disaster, it is that all these cloud-based solutions have been thoroughly battle-tested and can accommodate the requirements of even the largest businesses.
The world has changed profoundly over the past 15 months, and there will be no return to pre-Covid times any time soon. Instead of lamenting the loss, however, we should embrace the new normal, continue adopting modern security technologies, and use this unique opportunity to get rid of the huge technical debt of our legacy IT infrastructures. If done strategically, it should be a win-win situation for everyone. Well, excluding hackers, perhaps.
Alexei Balaganski is lead analyst at KuppingerCole and a specialist in artificial intelligence and cyber security. At KuppingerCole, he covers a broad range of cyber topics including database, application and API security, security analytics, date protection, and AI-based security automation. He holds a master’s degree in applied mathematics and computer science, and also previously served as KuppingerCole’s chief technology officer.
iPhone’s networking functionality reportedly has a new flaw that leads to disabling its Wi-Fi support completely if connected to a specific public Wi-Fi network. This flaw is said to affect any iPhone, and resetting the device’s network settings does not seem to solve the problem. Reverse engineer and Secret Club founder Carl Schou says that a Wi-Fi network called “%secretclub%power” can disable Wi-Fi of any iPhone that is connected to it. Users have taken to Twitter to share workarounds to this iPhone networking issue and one of them includes restoring the device using iTunes.
Schou took to Twitter claiming that users can permanently disable any iOS device’s Wi-Fi by hosting a public Wi-Fi named %secretclub%power. He tried to reset his network settings but that didn’t restore the iPhone’s functionality, nor did a force restart help in solving the issue. Users on Twitter have suggested that fixing the problem requires one to “manually remove” information from “com.apple.wifi.known-networks.plist”, repack it, and then do device restore.
Some users on Twitter claim that restoring the device using iTunes also helps resolve the problem but this may lead to loss of data as well. Remember to do a backup of data before beginning the workaround process. As mentioned, this flaw could lead to the complete disabling of Wi-Fi support on any iPhone and the suggested workaround is also a very complicated procedure.
A similar flaw was found by Schou in June when he reported that naming a network “%p%s%s%s%s%n” could also disable the Wi-Fi support of any iPhone that gets connected to it. Back then, the issue could be fixed by resetting the network settings, but the new flaw does not solve the issue with just that. Users have to do a lot more this time around, and most of them would be unaware of the process, forcing them to head for customer support.
In order to manually restore your device using iTunes, follow the steps mentioned in Apple’s support guide.
Gadgets 360 has reached out to Apple to get more information about the issue and its fix. We will update this article when we get a response.
Tasneem Akolawala is a Senior Reporter for Gadgets 360. Her reporting expertise encompasses smartphones, wearables, apps, social media, and the overall tech industry. She reports out of Mumbai, and also writes about the ups and downs in the Indian telecom sector. Tasneem can be reached on Twitter at @MuteRiot, and leads, tips, and releases can be sent to email@example.com. More
Managed service providers and organizations using the cloud or on-premises version of Kaseya’s VSA remote monitoring and IT management tool are waiting for decisions from the company Monday on if and when they can resume using the tool following a hack that has led to ransomware attacks on customers.
Kaseya told customers on Friday, July 3 that it had been victimized by a sophisticated cyber-attack and had to shut down the software-as-a-service version of VSA. More importantly, it urged IT administrators to take on-prem versions offline and rolled out a compromise detection tool. Kaseya believes only on-premises users of VSA are at risk.
On Sunday afternoon the company said the attack had involved “a very small number of on-premises customers only.” But CTV News quoted Kaseya CEO Fred Voccola telling the Associated Press that the victims number in the low thousands, mostly small businesses like “dental practices, architecture firms, plastic surgery centers, libraries, things like that.”
Voccola said in the interview that only between 50 and 60 of the company’s 37,000 customers were compromised. But 70 per cent were managed service providers who use the VSA software to manage multiple customers.
Researchers at Huntress Labs said Sunday it knows of 30 managed service providers and 1,000 organizations that have been victimized. All used the on-prem version of VSA. On Sunday Sophos said more than 70 managed service providers were impacted so far, resulting in more than 350 further impacted organizations.
At this point, it isn’t known if any victim firms are Canadian.
UPDATE: In an interview at noon today Alexis Dorais-Joncas, security intelligence lead at ESET’s Montreal reseach and development office, said from its telemetry at least “several” Canadian organizations have been hit by ransomware related to this attack. These would be customers of managed service providers. Canada is the third most impacted country, he added, behind the United Kingdom and South Africa.
“It looks like it [the spread of the ransomware] was contained relatively quickly,” he said. “From what we’ve seen in our telemetry there was a constant decline in detections in the last two days.”
Threat intelligence firm DarkTracer posted on Twitter a claim from the REvil ransomware group that more than 1 million systems had been infected. The price for a universal decryptor that can be used for all victims is $70 million in bitcoin. Either Kaseya is expected to pay this, or REvil expects all victim companies will chip into a pool of funds to pay the ransom, a new tactic.
In an interview with ITWorldCanada, Johannes Ullrich, dean of research at the SANS Institute, said the full number of victims in the U.S. may not be known until Tuesday, when IT staff return to work after the Independence Day long weekend.
Kaseya VSA customers have been without service for three days, raising the question of whether they will switch to a new service. Ullrich doubts managed service providers will, because of the time it will take to roll out a new product. “I don’t think they’ll make that decision quickly,” he said. Nor should IT departments using the on-premises version rush into a decision, Ullrich added.
SaaS service to restart first
In its Sunday statement, Kaseya said restoration of the cloud version of VSA will start first, followed by instructions for restoring on-prem installations.
Kaseya’s executive committee met late Sunday to decide on a timetable for restarting Kaseya servers hosting the SaaS version of VSA. A tentative schedule to begin restoring servers in European Union, the U.K. and Asia-Pacific regions around 4 a.m. Eastern has been shelved. The executive was scheduled to meet again this morning at 8 a.m.
“All on-premises VSA Servers should continue to remain offline until further instructions from Kaseya about when it is safe to restore operations,” the Sunday afternoon statement said. “A patch will be required to be installed prior to restarting the VSA and a set of recommendations on how to increase security posture.”
“Due to our teams’ fast response, we believe that this [attack] has been localized to a very small number of on-premises customers only,” Kaseya said. However, according to the news service The Record, one of Sweden’s largest supermarket store chains shut nearly 800 stores across the country after one of its contractors was hit by ransomware.
No data theft
According to the Bleeping Computer news service, the REvil ransomware group [also known as Sodinokibi or Sodin] is taking credit for the attack and is targeting managed service providers (MSPs) — but not their customers. The news service also says REvil has told victims that they only encrypted networks, suggesting that in this attack no corporate or customer data was stolen.
Researchers at Huntress Labs who looked at compromised servers said they “have high confidence that the threat actor used an authentication bypass in the web interface of Kaseya VSA to gain an authenticated session, upload the original payload, and then execute commands via SQL injection. We can confirm that SQL injection is how the actors began code execution.”
In a statement, Canadian-based managed security provider eSentire said it detected the Sodin/REvil ransomware dropper in one customer’s IT environment and was able to shut that system down before the ransomware could be deployed. eSentire has customers in several countries. The statement didn’t specify where this customer was located.
This isn’t the first time Kaseya has faced a breach of its security controls, the eSentire statement added. In 2018 it discovered an unknown threat actor attempting to deploy a Monero cryptocurrency miner to multiple eSentire customers through VSA. eSentire believes the threat actor figured out a zero-day in Kaseya and gained administrative access to Kaseya’s system. Then VSA was leveraged to download the Monero miner to victims’ endpoints.
“Gaining access to administration-level credentials for a remote management solution that distributes software, like Kaseya, and targeting managed service providers is a very efficient way of deploying ransomware to many organizations,” Eldon Sprickerhoff, eSentire ‘s chief innovation officer and founder, said in a statement. “Essentially, the MSPs do all the hard work for the threat actors because they unknowingly deploy the malicious software (in this case, the Sodin [REvil] ransomware dropper) out to all their customers. This current attack could very well be just a variation on the same attack tactic they used in 2018.”
Security teams whose organizations use the on-prem version of Kaseya VSA should check for indicators that the Sodin ransomware dropper or ransomware has already been installed onto their computer systems, he added.
Could have been worse
Sprickerhoff believes the latest attack on Kaseya could have been worse. The attack began early enough on Friday for it to be detected and acted on by Kaseya, he said. This was a long weekend in the U.S., so had the attack started on Saturday, when fewer IT and security teams would have been around in many organizations, there might not have been such a robust response.
In a statement issued Sunday, managed service provider Secureworks said it is “not seeing significant impact across our customer base. Less than 10 organizations appear to have been affected, and the impact appears to have been restricted to systems running the Kaseya software. We have not seen evidence of the threat actors attempting to move laterally or propagate the ransomware through compromised networks. That means that organizations with wide Kaseya VSA deployments are likely to be significantly more affected than those that only run it on one or two servers.
“Based on what we know right now,” Secureworks added, “we believe that this was an orchestrated attack against a subset of Kaseya VSA clients, largely managed IT service providers (MSPs). The evidence we have does not indicate that Kaseya’s software update infrastructure has been compromised. That does mean that, while we have seen limited impact across our customer base, there may be larger clusters of victims elsewhere based on use of common MSPs.”
James Shank, chief security architect for community services at threat intelligence firm Team Cymru, who was also a member of the Ransomware Task Force Committee, noted in a statement that threat actors have turned their attention to supply chain attacks. Kaseya is only the latest in a series that includes SolarWinds and CodeCov, he noted.
“This is not the first and it won’t be the last,” he said. “It is time to add another item to the already overwhelmed corporate security teams: audit suppliers and integrations with your supply chain providers. Limit exposure to the absolute minimum while still enabling business operations.”
Mark Manglicmot, vice-president of security services at managed services provider Arctic Wolf, called the Kaseya VSA supply chain ransomware campaign “a sophisticated and intentional attack, the scope of which will not be fully understood for many weeks or possibly months. Any organization using Kaseya VSA should treat this as a critical risk to their business and immediately shut down their Kaseya VSA server. They should also follow CISA guidance to ensure that back-ups are up-to-date and air-gapped, manual patching is implemented, multi-factor authentication (MFA) is turned on, and then await additional instructions from Kaseya for next steps.
“With supply chain attacks able to cascade across thousands of organizations within a matter of hours, those looking to protect themselves against future incidents must deploy world-class security operations with 24×7 monitoring capable of detecting, managing, and mitigating any threat. Often, users are seen as the weakest link, and adversaries will continue to exploit the human element to reach their objectives, which means establishing a stronger security posture is the first and best approach organization can take in avoiding future supply chain compromises.”
iPhone 13 series may support faster wireless charging, the latest leaks have suggested. The phone is said to come with a larger wireless charging coil which would allow for better heat dissipation and fast charging speeds compared to the previous generation iPhone 12 series. The leak also claims that portrait mode video feature will be present on iPhone 13 models. Apple is expected to unveil the new iPhone 13 series in September but the Cupertino giant has not shared any details yet.
EverythingApplePro posted a video on YouTube sharing the latest leaks about the upcoming iPhone 13 series in collaboration with Max Weinbach. There have been a lot of leaks regarding the iPhone 13 models that are expected to be unveiled in September and the latest hints at a larger wireless charging coil. This alleged increase in size for the wireless charging coil could be for better heat management and could also lead to support for higher wattage. This would give the iPhone 13 models faster wireless charging capability compared to iPhone 12 models that support 15W charging speed.
In February of this year, Weinbach stated that the 2021 iPhone models will have improved MagSafe technology with stronger magnets. This could also be an indication towards a larger wireless charging coil and fast charging speed.
In the new leak, the tipster also adds that the upcoming iPhone models could support reverse wireless charging thanks to the larger coil. Notably, back in October of last year, a US FCC listing showed support for reverse wireless charging on the iPhone 12 but the phone either does not support the feature or it has been disabled. In March this year, it was reported that Apple is working on a magnetic MagSafe-compatible battery pack for the iPhone 12 series that would support reverse charging.
Additionally, the video cites Weinbach for a leak suggesting support for portrait mode video. Apple added portrait to FaceTime which allows users to blur their background while in a video call with iOS 15. This feature is said to be available right in the camera app by default.
Vineet Washington writes about gaming, smartphones, audio devices, and new technologies for Gadgets 360, out of Delhi. Vineet is a Senior Sub-editor for Gadgets 360, and has frequently written about gaming on all platforms and new developments in the world of smartphones. In his free time, Vineet likes to play video games, make clay models, play the guitar, watch sketch-comedy, and anime. Vineet is available on firstname.lastname@example.org, so please send in your leads and tips. More
Garmin Venu 2 and Garmin Venu 2S smartwatches have launched in the Indian market. The two wearables come with Gorilla Glass 3 protection on the AMOLED touchscreen, health snapshot feature, and 25+ built-in sports apps. The Garmin Venu 2 has a 45mm dial, whereas the Garmin Venu 2S has a 40mm dial. The two smartwatches come with up to 11 days of battery life and offer storage for up to 650 songs. The Garmin Venu 2 comes with Body Battery energy monitoring and all-day stress tracking features.
Garmin Venu 2, Garmin Venu 2S price in India, sale
The new Garmin Venu 2 is priced at Rs. 41,990 in India. It comes in a silver bezel with granite blue case and silicone band and a slate bezel with black case and silicone band options. The Garmin Venu 2 is available to buy on Amazon, Flipkart, Tata CliQ, and synergizer.co.in.
Garmin Venu 2S is priced in India at Rs. 37,990. It comes in a slate bezel with graphite case and silicone band and rose gold bezel with white case and silicone band options. The Venu 2S is exclusive to Amazon till Prime Day.
Garmin Venu 2, Garmin Venu 2S specifications
One of the biggest differences between Garmin Venu 2 and Garmin Venu 2S is dial size. The Garmin Venu 2 has a 45mm dial, whereas the Garmin Venu 2S has a 40mm dial. The Venu 2 is said to last for up to 11 days n smartwatch mode, up to 12 days in battery saver smartwatch mode, up to 8 hour in GPS mode with music, and up to 22 hours in GPS mode without music. On the other and, the Venu 2S is said to last for up to 10 days n smartwatch mode, up to 11 days in battery saver smartwatch mode, up to 7 hours in GPS mode with music, and up to 19 hours in GPS mode without music. The Venu 2 weighs 49 grams whereas the Venu 2S weighs 38.2 grams.
Apart from this, both the Venu 2 and Venu 2S have identical features. They have an AMOLED touchscreen display with Gorilla Glass 3 protection. There is a new Health Snapshot function that gives you a detailed picture of each second’s data for your heart rate, blood oxygen, respiration and stress levels in just two minutes. It has more than more than 25 GPS sports activity modes including HIIT. The devices can measure blood oxygen, heart rate, and stress indicators for sleep quality and fitness age metrics.
Garmin Venu 2 and Garmin Venu 2S also come with body battery energy monitoring that tracks energy and stress levels, to let users know when it’s time to recharge and keep stress levels in check. The wearables can compute fitness age using its algorithm and offers 12 pre-loaded on-screen classes. Users can download even more workout programs via the Garmin Connect app. The devices can store up to 650 songs and other features include smart notifications, women’s health tracking, and more.
Affiliate links may be automatically generated – see our ethics statement for details.