Connect with us


Poco F1 starts receiving MIUI 11 update; here’s a recap of MIUI 11 update timeline for other Redmi devices



As promised, Xiaomi has started implementing the MIUI 11 update for Poco F1 users in India and other markets. As a reminder, the company shared a schedule for the deployment of the MIUI 11 update for several Redmi smartphones that also include the Poco F1.

The list was shared at the launch of the Redmi Note 8 series in India on October 16.

To return to the update of Poco F1, MIUI 11 Beta Stable v11.0.5.0.PEJMIXM for Poco F1, based on Android 9 Pie, is being implemented and brings the October patch for Android Security.

The update is approximately 1.8 GB in size. As Xiaomi already mentioned, the MIUI 11 update brings a minimalist design, environmental screen configuration options, a dark mode, a new file manager and Mimoji.

Announcing the launch, a message on the forum of the company My Community said: “Good news! The wait is finally over! The new MIUI 11 Global Beta Stable v11.0.5.0.PEJMIXM based on Android 9 Pie for POCO F1 should be implemented for Beta Testers / My Pilot users, if you have not received the update yet, please wait for it to be released.

As always, it looks like Global Beta Stable, which was first published by Beta team members receive feedback and will be followed by the launch of Global Stable for the general public, which will only be updated via OTA. ”

According to Xiaomi Update Tracker, the MIUI 11 update of the first phase will be available for Poco F1, Redmi K20, Redmi Y3, Redmi 7, Redmi Note 7, Redmi Note 7S and Redmi Note 7 Pro.

MIUI 11 will begin Nov. 4-12 and include devices such as Redmi K20 Pro, Redmi 6, Redmi 6 Pro, Redmi 6A, Redmi Note 5, Redmi Note 5 Pro, Redmi 5, Redmi 5A, Redmi Note 4, Redmi Y1, Redmi 4, Mi Mix 2 and Mi Max 2. It should be noted that users of Redmi K20 Pro have started receiving the update MIUI 11.

Redmi Note 7 Pro users have reported that they have received the MIUI 11 update this week, we now see that Poco F1 users are also getting the OTA update. While Xiaomi has not yet confirmed the implementation, some users of Poco F1 are sharing screenshots of the MIUI 11 update.

The implementation of MIUI 11 for Poco F1 was launched a few days ago and all users are expected to arrive in the coming days. Poco F1 was one of the first Xiaomi phones to receive MIUI 11 certification.

For those who wonder if the MIUI 11 update for Poco F1 is based on Android Pie and not Android 10. However, MIUI 11 offers some features of Android 10, such as:

For example, use the dark mode to scale the system. Depending on the screenshots, the size of the update file is approx. 1.8 GB. It is advisable to download it via WLAN.

The update log is similar to the MIUI 11 update that was made available to Redmi Note 7 Pro users earlier this week. MIUI 11 brings a new user interface into the optimized design for full-screen devices.

The OTA update also eliminates visual clutter, improves touch control, and adds the fast MiShare file transfer feature. In addition, MIUI 11 offers dynamic, nature-inspired notification alerts for alarm notifications and ringtones.

Xiaomi recently announced a list of compatible phones that will be updated in MIUI 11. The Poco F1 appeared alongside Redmi Note 7 Pro and Redmi K20 as the first set of phones to be updated in late October. Redmi Y3, Redmi 7 and Redmi Note 7 should also be updated in MIUI 11 in the coming days.

Phase 3 will begin November 13-29 and will include Redmi Note 6 Pro, Redmi 7A, Redmi 8, Redmi 8A and Redmi Note 8. The final phase of implementation of MIUI 11 (Phase 4) will include only Redmi Note 8 Pro and will be deployed from 18 to 26 December.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


The Android 10 beta for Galaxy S9 and Note 9 adds Google Biometric API support



While we saw the removal of the iris scanner from Samsung’s flagship products in 2019, the latest beta version of Android 10 for Galaxy S9 and Note 9 added support for Google’s new biometric API.

For those of you who have a Galaxy S9 or Note 9 device, you may have seen the beta program open in the United States. UU. For the OneUI 2.0 version of Android 10. According to some who have enrolled in Reddit, the iris scanner has gained the ability to be used in a wider range of applications supported by Google’s biometric API (via Android Police).

Previously, the iris scanner on the Galaxy S9 and Note 9 could really only be used to unlock your device, Samsung Pay and the Knox Secure folder. This update means that you can now use biometric data to secure and unlock apps that support Google’s biometric API, such as LastPass, Google Pay, and some banking apps.

Adding the Google Biometrics API to Android 10 versions for Galaxy S9 and Note 9 is a big benefit, but those with Galaxy S8 and Note 8 are unlikely to be able to use their own scanners. iris for more than now, as Android 10 will not reach any of the devices.

As a result, the iris scanner on both devices has become infinitely more useful than in the past. So, if you haven’t yet set up iris scanning on your Galaxy S9 or Note 9, it might be time to do that.

To activate iris scanning and record your own ocular biometry, you must go to Se

Continue Reading


Turn Your iPhone Into an iPod With Rewound



iOS: Here’s something silly to do on a Friday. Download Rewound and listen to your Apple Music library (streaming or ownership) through an old iPod interface with a click wheel.

A limited version is available for free, but $ 1.99 unlocks the entire application, and if you like the application after a test, you could also pay.

Rewound is an unofficial application. To be accepted in the App Store (unlike other retro iPod applications that have not been approved), the application can not include any trademark or commercial image of Apple, it can not emulate an iPod already made use. You need to upload an image of the iPod wheel yourself. Here’s how.

  1. Using the default buttons, go to Settings. Activate winding navigation.
    Then select Mask and Download masks.
  2. A GIF will show you how to save a photo in your library. Choose Twitter or Weibo, you don’t need to have an account either.
  3. On either one, you will see some iPod scroll wheels. Choose the one you like best and press.
  4. In Weibo, press and hold the download button in the upper right corner, then select Add to photos.
  5. On Twitter, touch and hold the image, then select Add to photos. Touch Done in the upper left corner.
  6. Select Add mask in Photos.

The application must tell you that it is going to “Design 3”, moving the buttons behind the mask you have downloaded, so that you can scroll with the scroll wheel.

You can download the users’ beautiful custom scroll wheels, which will make the experience less like an iPod and more like Winamp customization. By the way, Winamp is also back, but only on Windows.

Continue Reading


New iPhone Security Alert: iPhone Only Krampus-3PC Malware Campaign Confirmed



There’s no question that when it comes to security, the iPhone is a great smartphone option. This is probably the reason why so many information security professionals, especially ethical hackers and security researchers, use one. However, the fact that the iPhone works from a security point of view does not mean that users are safe from attacks.

Recent errors that could allow an attacker to block it on his iPhone, the vulnerabilities that could effectively block the iPhone with a malicious iMessage and even the security vulnerabilities present in a new iPhone 11 prove it. Of course, there is no doubt that the iPhone is less prone to the type of shocking Android malware attacks that we are so used to reading.

However, that doesn’t mean iPhone users can afford to be complacent. For a long time, it was thought that the threat actors produced variants of malware specifically encoded for iOS. Now there has been a totally specific malware campaign for iPhone actively exploited in the wild.

What is the Krampus-3PC malware campaign?

According to researchers from the Media Trust security and digital operations team, the Krampus-3PC campaign is aimed at iPhone users. And iPhone users alone. Sufficiently in time for the holiday season, hence the name Krampus, the unique malware used a variety of techniques to deliver the payload and avoid being detected by conventional scanning and blocking technology.

The Media Trust DSO report found that malicious advertising, also known as an advert attack, was used to distribute Krampus-3PC malware. More than 100 popular publishing websites, including many online newspapers, are said to have inadvertently broadcast malicious advertisements from a legitimate supplier of advertising technology.

How much payload does Krampus-3PC have on iPhone users?

iPhone users who browse these sites and see these adverts would be attacked without requiring user interaction. As soon as the creative label for the malicious ad was loaded, Krampus-3PC performed several checks to ensure that the ad was hosted and published as needed. He then injected a malicious script to activate the second verification step.

This confirmed if the navigation device was an iPhone before running the payload URL. Only iPhone users received this payload which redirected them to a malicious “reward” pop-up. If it failed, the Krampus-3PC persistence took hold and triggered a secondary method of loading the loading URL in another tab of the browser. By sucking in user session data, including the cookie ID, Krampus-3PC could hijack the browser.

“If the user had other sites open like their bank or favorite online retailer,” according to the Media Trust DSO report, then Krampus-3PC could “have access to the user account.”

Mitigate the risk of operating Krampus-3PC

Although the Media Trust report chose not to name the advertising platform that served the criminals Krampus-3PC, or the publications that unintentionally showed them to its proprietary iPhone readers, it is understood that the corrupted advertiser has now been banned from this platform.

However, that doesn’t mean that the Krampus-3PC threat isn’t resurrected by using a different platform to attack iPhone users. In fact, given the levels of sophistication shown here, I would be surprised if the criminal group behind him did not seek to leverage his investment again during the final stages of the Christmas shopping season.

As such, it is therefore essential to remain on guard, especially when it comes to clicking on emerging offers. Follow industry best practices to avoid phishing scams and check out these 26 iPhone security tips from 12 experts.

Continue Reading