Monday November 19, 2018
Home Lead Story OnePlus Makes...

OnePlus Makes its Entry into US With T-Mobile

The company has included a fast-charging 3700mAh battery and a 6.41-inch 2K OLED screen

0
//
OnePlus
There's no standard 3.5-mm headphone jack this time but that isn't much of a deal-breaker.
Republish
Reprint

With the launch of OnePlus 6T at an event here, Chinese smartphone maker OnePlus late Monday marked its entry into the US after partnering with mobile services operator T-Mobile.

“The OnePlus 6T and T-Mobile’s LTE network were made for each other. Customers have been asking us to help bring OnePlus to the US. We listened and delivered,” John Legere, CEO of T-Mobile, said in a statement.

“We found a kindred spirit in OnePlus — a company who is just as focused and customer experience obsessed as the Un-carrier.”

The five-year-old Chinese smartphone player’s new device is in line with the recent leaks and features a very small waterdrop style notch, high-end specifications and an affordable price when compared against the 2018 flagship competition.

“The OnePlus 6T is coming exclusively to the Un-carrier, making T-Mobile the first and only wireless provider in the United States to offer a OnePlus device ever! And to celebrate, T-Mobile customers can get their hands on this super hot superphone for more than half off,” the company said.

Un-carrier customers can snap one up earlier than anyone else exclusively at the T-Mobile Times Square store starting Tuesday.

OnePlus
The Shenzhen-based smartphone company was set to launch the handset at an event in India on Tuesday. (IANS)

Starting November 1, the OnePlus 6T goes on sale nationwide in T-Mobile stores and on T-Mobile.com.

The OnePlus 6T packs 128GB of internal storage and 8GB RAM and the much talked about fingerprint under display functionality.

There’s a flagship Qualcomm Snapdragon 845 processer under the hood, a 16MP + 20MP dual rear camera and 16MP front facing camera.

Also Read- Next On Its Way To Extinction: Mountain Birds

The company has included a fast-charging 3700mAh battery and a 6.41-inch 2K OLED screen.

The Shenzhen-based smartphone company was set to launch the handset at an event in India on Tuesday. (IANS)

Click here for reuse options!
Copyright 2018 NewsGram

Next Story

Heavy Cyber Attacks From Russia, US, China In India

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

0
cloudhopper,cyber attacks
A man holds a laptop computer as cyber code is projected on him in this illustration picture. VOA

India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.

According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.

Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.

cyber attacks
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. Pixabay

Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.

On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.

F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.

“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

Cryptocurrency, cyber attacks
Experts: Cyber attacks Growing Increasingly Sophisticated. Pixabay

“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.

To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.

“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.

Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).

Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.

Also Read: U.S. Government Warns People Against China-Linked Hacking Group

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

They enable F-Secure to collect the latest malware samples or shell scripts and new hacking techniques.

The research data is then processed to further benefit F-Secure customers via product enhancements and threat intelligence reports. (IANS)