According to the source, Xiaomi wants to expand the range of its own brands under which laptops will be sold. Many people know Mi Notebook under the brand name Xiaomi and RedmiBook under the brand name Redmi, and soon the emergence of notebooks under the Poco brand is expected.
The Indian regulator BIS gives a reason to think that laptops will appear in the Poco range. A battery with catalog number G16B01W was found in its base. This battery is used in the Redmi G laptop, its characteristics are also known – 15.2 V and 55.02 Wh. But at the same time, the battery is certified under two brands – Mi and Poco.
What will a Poco laptop be like if it’s really planned? You can probably forget about a stand-alone model: most of the current Poco smartphones are renamed Xiaomi and Redmi devices. The scenario in which the Redmi G 2021 will debut under the Poco brand is more likely. In the configuration of this model, recall, a 16.1-inch screen with a 144 Hz frame rate, Intel Core 11 and Ryzen 5000 processors, 16 GB of RAM and a 512 GB SSD – and battery G16B01W.
A stranger can access another smartphone or laptop without approaching it
Cybersecurity researchers have discovered a new attack technique. It allows hackers to extract user passwords using the Bluetooth component in order to manipulate traffic on a Wi-Fi chip. Indeed, according to a group of researchers in computer security of mobile networks from the universities of Darmstadt and Brescia, the coordination of wireless transmissions constitutes a attack surface.
To gain access to a mobile, the hacker must penetrate directly in the operating system of it. Which usually involves contact with the device. But this is no longer necessarily the case, thanks to the wireless chips that allow the system to be bypassed.
With this attack technique, the hacker can access all data of a stranger. He could then use it against the victim.
How is it possible ?
By leveraging the same mechanisms they typically use such as transmitting antennas and wireless support, chips bypass systems security to gain access to the devices. Manufacturers use the principle of coexistence to allow Wi-Fi and Bluetooth to work simultaneously.
The coexistence is thus a mechanism in which Bluetooth, Wi-Fi and Long Term Evolution (LTE) technology share the same components and resources. It helps to avoid interference when they operate on the same frequency.
Although this principle is unique to high-frequency spectrum sharing, it also presents a side-channel risk. This channel allows a malicious person to steal information on other mobiles supported by the combo chip.
This category of vulnerability is called Spectra and relies on the fact that the transmissions take place in the same spectrum. Since the chips have to arbitrate channel access, this breaks the Wi-Fi Bluetooth separation which leads to denial of service. What follows is spectrum access, information disclosure and lateral escalations from a hacker’s Bluetooth chip.
Additionally, researchers have found that it is possible for an attacker who has control of the Wi-Fi core toobserve bluetooth packets which allow him to reconstitute the texts entered using the keyboard. This can be a password or even bank account details.
The first attack scenarios have been reported to vendors since 2019. Nevertheless, to date, the coexistence flaws are still unpatched.
How to protect against these attacks?
To be protected from such wireless attacks, it is recommended to disable all unnecessary Bluetooth pairings. It is also imperative to remove unused Wi-Fi networks and especially to avoid public networks.
There is also software available for free on PlayStore or for sale on sites like ventedesite.com. These are the best way to protect against cybercriminals. Once these precautions are taken, users can feel safe.
Fewer laptops to be shipped in 2022 than in 2021, TrendForce predicts
Due to the lockdown caused by the pandemic and the resulting increase in demand, shipments of laptops in 2021 reached an all-time high of 240 million units, according to TrendForce data. Now, with vaccinations and a decrease in the number of employees working remotely, the corresponding demand caused by the pandemic is expected to gradually weaken. Thus, this year the volume of shipments will decrease by 3.3%, to 238 million units. Chromebooks will account for approximately 12.3% of shipments, up from approximately 15.2% in 2021. Supply dynamics have slowed significantly, indicating a decline in demand driven by the transition to remote work and training.
At the same time, the gradual return of European and American companies to work in offices, which caused a wave of equipment replacement, led to an increase in demand for laptops in the corporate segment. As a result, notebook shipments in the fourth quarter of 2021 reached their highest level of the year, at 64.6 million units. In addition, due to severe chip shortages, order fulfillment will continue into the current quarter, so the usual off-season downturn is expected to be short. Compared to an average quarterly decline of 15% in previous years, it is expected to be no more than 10% this year.
CES 2022: New Acer notebooks bring RTX 3080 and new CPUs
THE acer announced during the CES 2022 the new Predator Triton 500 SE, Helios 300 and Acer Nitro 5 notebooks. Models with new-generation Intel Alder Lake or Ryzen 6000 processors start arriving in February with a choice of GeForce RTX 3070 Ti, RTX 3080 or RTX 3080 Ti GPUs .
Learn more about each device below:
Acer Predator Triton 500 SE
The Predator Triton 500 SE features an extended 16-inch 240 Hz display with QuadHD resolution of 2560 x 1600 (16:10), Intel Alder Lake Core i9 processor, GeForce RTX 3080 Ti and 32 GB of 5200 MHz LPDDR5. also include 2TB of PCIe4 storage and system Windows 11.
The Triton 500 SE has two USB 3.2 ports, two Thunderbolt 4 ports with DisplayPort support, an HDMI 2.1 port, 2.5G Ethernet port, Wi-Fi 6E and a card reader. The notebook will cost from US$ 2,300 (R$ 13 thousand) and will be launched in March in the US.
Acer Predator Helios 300
The Predator Helios 300 features a Core i7 Alder Lake CPU and a choice of 15.6″ or 17.3″ 165Hz displays with QuadHD resolution, but in the traditional 16:9 aspect ratio (2560×1440). Model brings configurations with GeForce RTX 3070 Ti or RTX 3080, 32 GB of DDR5 and up to 2 TB of PCIe4 storage.
Predator Helios 300Source: acer
In addition, it has two USB 3.2 connections, one Thunderbolt, HDMI 2.1 port, Killer DoubleShot Pro ethernet port and Wi-Fi 6E. Model arrives in May priced from US$2,300 for the 15″ version and US$2,400 for the 17″ version.
Acer Nitro 5
The Acer Nitro 5 has versions with Intel Core i7 Alder Lake or Ryzen 6000, also with 15″ or 17″ options, 144 Hz FullHD screen, and GeForce RTX 3070 Ti graphics card. The model comes with 32GB of RAM, but only the Ryzen version supports DDR5.
Acer Nitro 5Source: acer
Nitro 5 notebooks with Intel Core i7 CPUs arrive in March, while those with Ryzen 6000 only appear on the market in April, starting at US$1,050 and US$1,100 respectively.
This Telegram feature allows you to store unlimited files online
Highly appreciated by Internet users for the transfer of unlimited files, the Telegram application receives a new very practical service....
The Tesla Cybertruck electric pickup truck will have a “little brother” in miniature form
While Elon Musk and Tesla continue to push back the start of production of the Cybertruck electric pickup truck to...
WhatsApp will soon be able to draw with different strokes
The Meta (former Facebook) team of the popular WhatsApp messenger is working on a new interesting feature for users. In...
Taiwan strives to become self-sufficient in semiconductor equipment
Taiwan President Tsai Ing-Wen told local media that she believes Taiwan can become self-sufficient when it comes to semiconductor equipment,...
News3 days ago
19-year-old hacker claims to have taken control of 25 Tesla cars around the world
Phones3 days ago
The first radical change in the iPhone for many years: iPhone 14 Pro and iPhone 14 Pro Max smartphones will receive a camera with a resolution of 48 megapixels
Phones7 days ago
How to contact TikTok by email, phone and other ways?
How To4 days ago
How to hide programs in Windows without uninstalling