Showing posts with label India. Show all posts
Showing posts with label India. Show all posts

Friday, April 21, 2017

Beware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws


Thursday, April 20, 2017 Swati Khandelwal



Bad news for consumers with Linksys routers: Cybersecurity researchers have disclosed the existence of nearly a dozen of unpatched security flaws in Linksys routers, affecting 25 different Linksys Smart Wi-Fi Routers models widely used today.

IOActive's senior security consultant Tao Sauvage and independent security researcher Antide Petit published a blog post on Wednesday, revealing that they discovered 10 bugs late last year in 25 different Linksys router models.

Out of 10 security issues (ranging from moderate to critical), six can be exploited remotely by unauthenticated attackers.

According to the researchers, when exploited, the flaws could allow an attacker to overload the router, force a reboot by creating DoS conditions, deny legitimate user access, leak sensitive data, change restricted settings and even plant backdoors.



Many of the active Linksys devices exposed on the internet scanned by Shodan were using default credentials, making them susceptible to the takeover.

Researchers found more than 7,000 devices impacted by the security flaws at the time of the scan, though this does not include routers protected by firewalls or other network protections.

"We performed a mass-scan of the ~7,000 devices to identify the affected models," IOActive says. "We found that 11% of the ~7000 exposed devices were using default credentials and therefore could be rooted by attackers."IOActive made Linksys aware of the issues in January this year and is working "closely and cooperatively" with the company ever since to validate and address the vulnerabilities.


Here's How critical are these Flaws:
The researchers did not reveal more details about the vulnerabilities until the patch is made available to users, although they said two of the flaws could be used for denial-of-service attacks on routers, making them unresponsive or reboot by sending fraudulent requests to a specific API.

Other flaws could allow attackers to bypass CGI scripts to collect sensitive data such as firmware versions, Linux kernel versions, running processes, connected USB devices, Wi-Fi WPS pins, firewall configurations, FTP settings, and SMB server settings.

CGI, or Common Gateway Interface, is a standard protocol which tells the web server how to pass data to and from an application.



Researchers also warned that attackers those have managed to gain authentication on the devices can inject and execute malicious code on the device's operating system with root privileges.

With these capabilities in hands, attackers can create backdoor accounts for persistent access that are even invisible in the router smart management console and so to legitimate administrators.

However, researchers did not find an authentication bypass that can allow an attacker to exploit this flaw.


List of Vulnerable Linksys Router Models:
Here's the list of Linksys router models affected by the flaws:

EA2700, EA2750, EA3500, EA4500v3, EA6100, EA6200, EA6300, EA6350v2, EA6350v3, EA6400, EA6500, EA6700, EA6900, EA7300, EA7400, EA7500, EA8300, EA8500, EA9200, EA9400, EA9500, WRT1200AC, WRT1900AC, WRT1900ACS, and WRT3200ACM.

The majority of the exposed devices (nearly 69%) are located in in the United States, and others are spotted in countries including Canada (almost 10%), Hong Kong (nearly 1.8%), Chile (~1.5%), and the Netherlands (~1.4%).

A small percentage of vulnerable Linksys routers have also been spotted in Argentina, Russia, Sweden, Norway, China, India, UK, and Australia.


Here's How you can Mitigate Attacks originating from these Flaws:
As temporary mitigation, Linksys recommended its customers to disable the Guest Network feature on any of its affected products to avoid any attempts at the malicious activity.

The company also advised customers to change the password in the default account in order to protect themselves until a new firmware update is made available to patch the problems.

Linksys is working to release patches for reported vulnerabilities with next firmware update for all affected devices. So users with Smart Wi-Fi devices should turn ON the automatically update feature to get the latest firmware as soon as the new versions arrive.

Wednesday, April 5, 2017

Asus ROG GX800: Republic of Games series has the most powerful gaming laptop for Rs 7,97,990

Asus ROG GX800: Republic of Games series has the most powerful gaming laptop for Rs 7,97,990

Image Credit: Asus ROG
Asus’ Republic of Gamers (ROG) has announced the launch of Asus ROG GX800. The company claims that this gaming is laptop is the most powerful on the planet right now. However, the device can be ordered on request for an insane price of Rs 7,97,990 as GX800 comes equipped with Nvidia GeForce GTX 1080 in SLI configuration. GX800 also comes with an advanced version of Hydro Overclocking system with cools the laptop through the liquid-cooling module. This allows gamers to overclock and squeeze extra performance out of the gaming beast. It helps the users push GX800 frequencies from 3.2GHz to 4.4GHz.
ASUS ROG GX800 Docking
Image Credit: Asus ROG
On the specifications side, GX800 comes with an 18-inch display along with a 4K UHD resolution. The laptop is equipped with Nvidia G-Sync technology that adds support to virtual-reality headsets. GX800 comes along with Mechanical Tactical Advanced Gaming (MechTAG) keyboard that features ROG Aura RGB LED lights that can be programmed in any configuration according to the choices of the user. Each key on the keyboard can be programmed separately. GX800 succeeds the GX700 which was the first gaming laptop to use liquid-cooling.
Image Credit: Asus ROG
Image Credit: Asus ROG
To prove the point Asus claims that GX800 scored a score of 10395 in the Fire Strike Ultra test in 3DMark benchmarking software. The machine as two 330W power adaptors to cope with demands.
The cooling module has two radiators that help the coolant dissipate heat after it is pumped and circulated around the processor and graphics card. The company reports that the overclocking system allows the machine to deliver smooth VR experience with the frame rates over 90fps.
Publish date: April 5, 2017 10:13 am| Modified date: April 5, 2017 10:13 am

Tuesday, April 4, 2017

Vivo V5 Plus IPL Limited Edition phone to launch today in celebration of IPL 2017

Vivo V5 Plus IPL Limited Edition phone to launch today in celebration of IPL 2017

Image Credit: Vivo
Chinese smartphone maker Vivo is launching a limited edition smartphone for the upcoming IPL 2017 (Indian Premiere League). IPL 2017 marks the 10th season of the annual Twenty20 cricketing event in India. The opening match of IPL 2017 is set for 5 April, Wednesday between Sunrisers Hyderabad vs Royal Challengers Bangalore.
The company has sent invites across for the launch event in Hyderabad. The Vivo V5 Plus was announced back in January and made available for the general public back in February. The only difference between the Vivo V5 Plus and the IPL Limited edition seems to be the matte black colour of the smartphone. One thing to note here is that Vivo is the official sponsor for IPL and the smartphone may come loaded with IPL-related apps but we are purely speculating about the second part here.
The Vivo V5 comes with a 5.5-inch display with HD (1280×720) resolution and a 2.5D curved Gorilla Glass 3 on top, a 1.8 GHz Snapdragon 652 octa-core processor with 4 GB RAM along with 32 GB internal storage expandable up to 128 GB via microSD card is also present. In the camera department, it offers a 13 MP sensor on the back while a 20 MP sensor on the front takes charge of capturing selfies.
The camera on the back features a soft-LED flash and PDAF (phase detection autofocus). The smartphone also features a fingerprint scanner embedded in the home button, 4G LTE bands support, dual-SIM card slot, a 3,055 mAh battery and even Vivo’s proprietary Fast Charging technology. It runs on Android 6.0 Marshmallow with Vivo’s FunTouch OS 2.6 skin on top.
It is highly unlikely that the smartphone will come with any changes in the hardware.
Publish date: April 4, 2017 9:25 am| Modified date: April 4, 2017 9:25 am

Monday, April 3, 2017

CloudFlare and LimeStone Networks have been securing terror group Jaish-e-Mohammad’s websites

CloudFlare and LimeStone Networks have been securing terror group Jaish-e-Mohammad’s websites

Two technology firms based out of San Francisco and Texas have been securing Pakistan-based terror outfit Jaish-e-Mohammad’s website while boosting its reach online, enabling easy access to its users.
CloudFlare works like a shield between the user and original host of the website and the internet. In this case, alqalamonline.com and rangonoor.com are the offending websites and they’re hosted by SiteGround, a web hosting company based out of Bulgaria. CloudFlare protects the sites from DDoS (Distributed Denial of Service) attacks and other such hacking attempts.
According to a detailed report by DNA, Jaish-e-Mohammad (JeM) has enrolled both the websites for protection against DDoS and other malicious, script-based attacks via CloudFlare since March 2014.
The report indicates that the websites in question are hosted on 104.18.56.73 and 104.27.132.179 IP addresses. Both these IP addresses are linked to CloudFlare, which is based-out of California. CloudFlare also caches the website so that it can load faster, as detailed by Mumbai-based cyber security researcher, Dinesh Bareja.
Vanessa Royale, a representative for CloudFlare told DNA that the company is not hosting the websites. She added that “IP addresses may appear in a DNS (Domain Name System) query since we are a reverse proxy.”
Royale refused to comment on CloudFlare’s customers or the company’s plans. She tried to slip the issue of CloudFlare protection by stating that CloudFlare is not responsible for hosting any terrorist websites and that terminating a customer will only result in a slower site that’s a little easier to hack.
Royale is essentially stating that CloudFlare is protecting the terrorist websites but that it isn’t hosting them so it isn’t such a big deal. It’s quite likely that CloudFlare isn’t even aware that the site it’s protecting is a terrorist website and it’s unlikely to deliberately provide safe harbour to terrorists. However, the company’s response is rather tame.
The report confirmed that both websites were running on 77.104.156.63, an IP address managed by SiteGround. The websites are managed by  a web administrator called Muhammad Tariq Siddique from Karachi, reveals the report.
One thing to note is that American companies are barred from performing financial transactions with designated terror organisations and JeM has been denounced by the UN and the USA since 2001 for its activities. JeM is the same group responsible Parliament attack in 2001, Pathankot air force base attack and the Nagrota camp attack.
The terror outfit has also enrolled help from LimeStone Networks for hosting other domains like musalmanbachay.comfathulijawaad.com and sadaemujahid.com, as part of its online propaganda in the form of videos of terrorists hailed as martyrs, quranic verses, poetry on war and propaganda articles.
These domains provide soft propaganda and introduce young children and teenagers to the thought-process of JeM ideology. Both these companies have been painted as favourites for the Islamic State, al-Qaeda, Hezbollah and other extremist groups.
Despite all this, law enforcement authorities in the United States have not taken any action against CloudFlare and Pakistani authorities only briefly shut down JeM’s online publications after the Pathankot attack.
Publish date: April 3, 2017 10:15 am| Modified date: April 3, 2017 10:13 am

Thursday, February 9, 2017

Xiaomi launches Redmi Note 4X in China with Snapdragon 653 and special Miku edition

Xiaomi launches Redmi Note 4X in China with Snapdragon 653 and special Miku edition

Image Credit: Xiaomi
By 
Xiaomi officially launched the updated version of Xiaomi Redmi Note 4, the Redmi Note 4X in China. As all the product launches, officially, this will be limited to China in terms of availability. One important thing to note is that design-wise the Redmi Note 4X is same as the Redmi Note 4. The only difference is the availability in Teal Green which is being termed as the limited edition Hatsune Miku edition, on the occasion of Valentine’s Day.
Image Credit: Xiaomi
Image Credit: Xiaomi
For the uninitiated, Hatsune Miku is an extremely popular singing synthesiser app primarily popular in Japan. The popularity is such that people attend concerts where the holographic avatar of Miku is performing on stage. In addition to the ‘Hatsune Gree’, the company has also launched a variant in ‘Cherry Pink’ colour as reported by GSMArena. The entire package comes along with a stylised package, protective case and limited edition Mi Power bank.
Image Credit: Xiaomi
Image Credit: Xiaomi
The company has not published detailed specs of the smartphone along or the pricing but the company is expected to release these details prior to the sales day. However, as reported by GSMArena, the internals of the Redmi Note 4X are exactly the same as the internals of Redmi Note 4. In terms of hardware, the phone will be powered by a Snapdragon 653 chipset internationally and a MediaTek Helio X20 in China (the same as on the Chinese Note 4). The current international edition of the Note 4 uses the Snapdragon 625 chip, which is slightly less powerful than the 653, but more power efficient.
Storage options will now include variants with 3GB RAM / 32GB storage, 4GB RAM / 32GB storage and 4GB RAM / 64GB storage. Unlike the Note 4, there will be no 2GB RAM variant.

50,362 cyber security related incidents were logged in 2016, says CERT-In

50,362 cyber security related incidents were logged in 2016, says CERT-In

Image Credit: Venture Beat
Over 50,300 cyber security incidents like phishing, website intrusions and defacements, virus and denial of service attacks were observed in the country during 2016, Parliament was informed today. “As per the information reported to and tracked by Indian Computer Emergency Response Team (CERT-In), a total number of 44,679, 49,455 and 50,362 cyber security incidents were observed during the year 2014, 2015 and 2016, respectively,” Minister of State for Electronics and IT P P Chaudhary said in a written reply to Lok Sabha.
He added that the types of cyber security incidents included phishing, scanning/probing, website intrusions and defacements, virus/malicious code and denial of service attacks. “With the proliferation of Information Technology and related services, there is a rise in instances of cyber crimes in the country like elsewhere in the world,” he said.
As per the data maintained by National Crime Record Bureau (NCRB), a total of 5,693, 9,622 and 11,592 cybercrime cases were registered during the years 2013, 2014 and 2015, respectively, showing a rise of 69 per cent during 2013 to 2014 and 20 per cent during 2014 to 2015. “This includes cases registered under the IT Act, 2000 and related sections of Indian Penal Code and Special and local laws involving compouter as a medium/target. Similar data for the year 2016 is under collection,” he said.
Also, RBI has registered a total of 9,500, 13,083, 16,468 and 8,689 cases of frauds involving credit cards, ATM/debit cards and internet banking during the year 2013-14, 2014-15, 2015-16 and 2016-17 (upto December 2016), respectively. Further, CBI has registered a total of 87 cases during 2014 to 2016. Out of these 87 cases, charge sheets have been filed in 36 cases, status report filed in copmpettent court in 4 cases, 6 cases were closed and 41 cases are under investigation by CBI.
Besides, 4,699 and 6,266 cases were registered during the year 2014 and 2015, respectively for stalking women (Section 354D IPC) during 2014-15, as per data maintained by NCRB. This is a rise of 25 per cent during 2014 to 2015. The Minister said a total number of 28,481 websites were hacked in 2013, 32,323 (2014), 27,205 (2015) and 33,147 (2016).
“It has been observed attacks are launched through compromised computer systems located in different parts of the world. Masquerading techniques and hidden servers are also used to hide the identity of the actual systems being used by malicious actors,” he said. The attacks are observed to be originating from various countries including China, Germany, Hong Kong, Japan, Malaysia, Pakistan, Romania, the UK, the US, Syria, the UAE and Italy, he added.
PTI

Thursday, January 12, 2017

India and US sign memorandum of understanding to continue cooperation in cyber security

India and US sign memorandum of understanding to continue cooperation in cyber security

India and the US have signed a memorandum of understanding (MoU) on cooperation in the field of cyber security, an official statement said on Wednesday. “India and the US have signed a memorandum of understanding between the Indian Computer Emergency Response Team (CERT- In) under the Ministry of Electronics nd Information technology of the government of India and the Department of Homeland Security, government of the United States of America on cooperation in the field of cyber security,” the statement said.
The agreement was signed by Aruna Sundararajan, secretary, Ministry of Electronics and Information Technology, and Richard Verma, US Ambassador to India, on Wednesday here. “The MoU intends to promote closer co-operation and the exchange of information pertaining to the cyber security in accordance with the relevant laws, rules and regulations of each economy and this MoU and on the basis of equality, reciprocity and mutual benefit,” the statement said.
Earlier the US and India had signed an MoU on July 19, 2011 to promote closer cooperation and timely exchange of information between the organisations of their respective governments responsible for cyber security. Since, July 19, 2011, regular interactions between CERT-In and US CERT are taking place to share the information and discuss cyber security-related issues.
In continuation to the cooperation in cyber security areas both have renewed the MoU, the statement added.
IANS

Monday, December 12, 2016

In-flight Wi-Fi in India to be delayed indefinitely by “spurious” security concerns and red tape

In-flight Wi-Fi in India to be delayed indefinitely by “spurious” security concerns and red tape

By 
Wi-Fi over the skies of India will remain a pipe-dream for now. In August, Civil Aviation Secretary Rajeev Chaubey had stated that we can expect to see in-flight Wi-Fi “in the next 10 days.” It’s now December.
A report on The Wall Street Journal reveals that the plans for in-flight Wi-Fi in India will remain banned, pending approval from the “communications ministry.” The Home Ministry has reportedly been opposed to the plan, citing security concerns.
As it stands today, any commercial passenger aircraft is required to disable in-flight Wi-Fi access when flying over Indian airspace. This includes international flights.
As Mashable points out, airlines such as Jet Airways already have approval from the Federal Aviation Authority and other regulatory bodies. Even our neighbours, Pakistan and China included, already allow in-flight Wi-Fi.
International flight safety norms are quite stringent and it’s hard to see what’s worrying the Home Ministry so. Mashable also adds that aviation technology specialists have dismissed these security concerns as “spurious”.
In fact, one can easily make the case that free Wi-Fi at railway stations is a far greater cause for concern than in-flight Wi-Fi in a closed, isolated environment 36,000 feet above the ground.
With this push for Digital India, demonetisation pushing the country to digital transactions and myriad such future-looking plans, it’s hard to believe that the fastest, most modern system of transportation is still held back in such a way.

Thursday, December 8, 2016

Paytm launches payment method for people without internet

Paytm launches payment method for people without internet

Image Credit: Paytm
By 
Paytm has announced the launch of a new toll-free number 180018001234 to help customers use Paytm without an internet connection. This is particularly important for the times when internet connectivity is patchy, and continued disconnections would stop you from using the Paytm app. Both users, as well as merchants, can now use the feature just by calling the toll-free number to pay and receive money. The facility can be used to recharge their mobiles which will empower millions of non-smartphone users across India.
To use this facility, the users need to be registered with Paytm with their mobile numbers and have a four digit Paytm PIN just like any ATM PIN. The users need to call the number and enter the contact number of the recipient and enter Paytm PIN to transfer the money. Paytm is already offering its Digital cash services for users to pay in Taxis, Autos, Petrol Pumps, grocery shops, restaurants, multiplex, parking, pharmacies, hospitals, Kirana stores, etc.
“We are committed to enabling more and more Indians to be able to transact digitally. The launch of our new toll-free payment number is another significant step in that direction. This will allow even non-smartphone users across India go cashless,” added Nitin Mishra, Senior Vice President for Paytm.

Thursday, December 1, 2016

Congress Party and Rahul Gandhi’s Twitter account hack come as no surprise for cyber experts

Rahul Gandhi’s Twitter account
Rahul Gandhi

01 Dec 2016 , 17:02


As the news of Congress Party and its Vice President Rahul Gandhi’s Twitter accounts being hacked spread like wildfire on Thursday, cyber experts were not surprised as the phenomenon is quite common across the globe where hackers are always a step ahead when it comes to data breach — be it a social media platform or your financial information. When it comes to celebrities, Facebook CEO Mark Zuckerberg, Twitter CEO Jack Dorsey, Google CEO Sundar Pichai, Twitter co-founder and former CEO Evan Williams, US actor-singer Jack Black — even the deceased Beatle George Harrison — have seen their social media accounts being hacked in recent times.
Even social networking websites with two-step verification procedures are not secure any more as hackers have evolved various strategies to steal personal information from computers, laptops or smartphones. “There may be a possibility that Rahul Gandhi’s Twitter account was logged into from an unsecured computer or a device that did not have next-generation firewall, an updated anti-virus software or from a compromised IP address. This situation is a boon for hackers who are constantly searching for security flaws and hack into the social media accounts of celebrities and political leaders,” Anoop Mishra, one of the nation’s leading social media experts, told IANS.
According to Saket Modi, Co-founder and CEO of IT risk assessment and digital security services provider Lucideus, the social media hack of both Congress Party and its Vice President’s Twitter accounts can be a result of any one of two possibilities. “It can either be a potential backdoor (malware) being present on a computer system on which both the accounts might have been simultaneously accessed, or this can be a long, persistent and targeted attack (spear phishing in most cases) on the political party. In either case, I am certain there is more data in the hands of the hackers than just account access that might be released in due course of time,” Modi told IANS.
“The only two parties responsible for the security of a social media account are the social media provider (in this case Twitter) and the owner of the account. As these are just two accounts that have been compromised and misused, it is safe to assume that the exploited vulnerability was not present on the side of Twitter,” Modi added. There are several infamous groups busy working day and night to hack into social media accounts — be it Legion, that claimed to have hacked into Rahul Gandhi’s Twitter account, or OurMine, that compromised the Twitter accounts of Zuckerberg, Dorsey, Pichai and others.
The most popular website among hackers is LeakedSource.com which compiles the databases for publicly available hacks of usernames, passwords and email addresses from every major website security breach over the last few years, say media reports. For a country like India that is transitioning to a digital era, experts feel there is a need for stronger cyber laws to minimise such cyber-bullying risks.
“India still does not have a dedicated legislation on cyber security or bullying when it comes to social media platforms. The country, given its vision of becoming an IT super-power, needs to have a dedicated cyber security law on this at the earliest,” Pavan Duggal, one of the nation’s top cyber law experts and a senior Supreme Court advocate, told IANS. The Information Technology Act, 2000, was amended in 2008. By virtue of the 2008 amendments, certain cosmetic changes concerning cyber security were made to the Information Technology Act, 2000.
“These amendments are not sufficient and adequate in today’s scenario. Further, the cyber security breach ecosystem ground realities are distinctly different in 2016 as compared to 2008. As such, there is a distinct need for India to beef up its legal frameworks on cyber security and cyber bullying,” Duggal added. People need to adopt various cyber hygiene methodologies in order to avoid online data stealing.
“Having in place an updated anti-virus software on your computer system is a critical component. There are several encrypted data services available which can be used abroad. Company executives should only access HTTPs sites — being secure sites,” Duggal suggested. “If you’re accessing something sensitive on public Wi-Fi, try to do it on an SSL (Secure Socket Layer) encrypted websites. The HTTPs browser extension can reduce the risk by redirecting you to an encrypted page when available,” Mishra explained.
Turn off file/computer/network sharing and avoid using specific websites where there’s a chance that cyber criminals could capture your identity, passwords or personal information. “Make all new PIN and account passwords different and difficult to guess. Include upper and lower case letters, numbers and symbols to make passwords harder to crack online,” suggested Sunil Sharma, Vice President-Sales and Operations (India & SAARC), Sophos, a global leader in network and endpoint security.
IANS

Saturday, November 26, 2016

OnePlus releases new updates fixing bugs in OxygenOS for both OnePlus 3 and OnePlus 3T

OnePlus releases new updates fixing bugs in OxygenOS for both OnePlus 3 and OnePlus 3T

Image Credit: OnePlus
By 
OnePlus has announced the launch of newest update for OxygenOS for OnePlus 3 and OnePlus 3T users. The update for OnePlus 3 has just been launched, and it will be rolling out for all the users in a staged manner in the coming week. One thing to note is that the OxygenOS is still on Android Marshmallow 6.0.1 and this update is not the stable version of the changes seen and done in OxygenOS Community Build release cycle.
Instead, this update is entirely different and fixes some of the issues being faced by the OnePlus 3 users. The update for OnePlus 3 comes a day later than the update for OnePlus 3T users. The OnePlus 3T update looks more like a bugfix for the users to install on the first day as not many users have received the device. The company has rolled out OxygenOS 3.5.3 as the first OTA for the newly launched smartphone which adds emergency calling for India, Motion detection in camera along with enhanced image quality.
Image Credit: subodhsg, OnePlus Forums
Image Credit: subodhsg, OnePlus Forums
OnePlus also added the OnePlus community app, updated and optimised the touch panel firmware for precision and updated GPS library. Also, OnePlus has redesigned the clock and calling UI for OnePlus 3T users along with increased stability. OxygenOS 3.2.8 update for OnePlus 3 will add 1080p video recording at 60fps, emergency calling, increased system stability and bug fixes. One important thing to note is that the company has also added optimisation for Snapchat on the OS level to fix the video calling and lags in scrolling.
The company seems to have followed up with its promise that it will be launched the updates for both OnePlus 3 and OnePlus 3T at almost the same time. Another massive update is expected to launch somewhere early next month which will bring a whole bunch of features for OnePlus 3 and OnePlus 3T users including features like long screenshot, redesigned interface and other things along with OxygenOS Community Build based on Android Nougat 7.0. This comes right after the company announced that OnePlus 3T will start selling in India from December 2.

Monday, November 7, 2016

Xiaomi’s new Mi Sports Bluetooth headset are sweatproof offer 7-hours of battery

Xiaomi’s new Mi Sports Bluetooth headset are sweatproof offer 7-hours of battery

By 
Xiaomi has transformed from just a smartphone maker into a technology brand. From power banks to air purifiers, there is no stopping the Chinese giant. It has just announced a new sports Bluetooth headset with a not so innovative name, the Mi Sports Bluetooth Headset.
The earbuds look very neat and offer a loop so to secure them around your earlobes. Yes, they are connected with a wire so they will be much more secure. In terms of weight they weigh at just 17.8gms and a 110mAh battery which is said to offer 7-hours of battery backup. It comes with Bluetooth 4.1 along with A2DP and it can be paired with up to two devices at the same time.
Millet sports Bluetooth headset - Millet Mall
They are splash resistant with an IPx4 rating so a bit of sweat and light rain will not damage it. The company says that it has the capacity to operate in temperature range of -20°C to 70°C, but we doubt anyone would listen to music at those extreme temperatures.
mi-sports-bluetooth-headset-1
The Mi Sports Bluetooth headset will come in two colour options, black and white and are priced at 149 CNY which is about Rs 1,500. They will come with five ear tips as well. No word if the company will launch the product in India as of yet.

Related Posts Plugin for WordPress, Blogger...