logo
Tiny but mighty: This cheap projector promises big movie nights without the big price

Tiny but mighty: This cheap projector promises big movie nights without the big price

TL;DR Yaber has launched a budget-friendly projector with a small footprint and sleek design perfect for on-the-go use.
The new Yaber T1 Pro can project screen sizes from 40 to 120 inches and includes a built-in 8W speaker.
The projector is available through Yaber's website for $159.99 in the US and €179.99 in select European countries.
Building on the success of the Yaber T2 Plus, projector maker Yaber has launched an ultra-compact projector aimed at budget-conscious buyers that could shake up the affordable projector scene. Despite its $159.99 price tag, the new Yaber T1 Pro packs impressive features, including a 180-degree rotating gimbal stand, a built-in 8W speaker, preloaded apps for major streaming services, and more.
The Yaber T1 Pro has a 1.18:1 short-throw ratio and can project screens from 40 inches to 120 inches with a native 1080p resolution. It includes HDR10 support for enhanced contrast and smart features like auto focus, auto keystone correction, intelligent screen alignment, and obstacle avoidance for a quick and easy setup.
Its innovative pop-up design further speeds up setup, with Yaber claiming users can deploy it in just 3 seconds with the tap of a button. This, combined with its compact footprint, lightweight chassis, 8W speaker, and built-in nylon strap, makes it a good option for on-the-go use.
Pranob Mehrotra / Android Authority
On the software front, the T1 Pro runs a Linux-based operating system with preloaded apps for Netflix, YouTube, and Prime Video. The projector also supports wireless screencasting from Android, iOS, and Windows devices, allowing users to easily cast media from their preferred source. For connectivity, Yaber has included Wi-Fi 6 and Bluetooth 5.4, along with HDMI ARC and USB-A ports.
If you're in the market for a compact projector that doesn't break the bank, you can grab the Yaber T1 Pro from the company's website in the US and select European countries starting today. Yaber plans to expand availability to Amazon and other retailers in the coming weeks.
Got a tip? Talk to us! Email our staff at
Email our staff at news@androidauthority.com . You can stay anonymous or get credit for the info, it's your choice.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

US Mobile's firecracker $249 Pixel 9 deal is coming back for the Fourth of July
US Mobile's firecracker $249 Pixel 9 deal is coming back for the Fourth of July

Android Authority

time12 minutes ago

  • Android Authority

US Mobile's firecracker $249 Pixel 9 deal is coming back for the Fourth of July

Edgar Cervantes / Android Authority TL;DR US Mobile is bringing back its $249 Pixel 9 deal for new and existing customers. The offer discounts the Google flagship by a whopping 68% The deal goes live on Friday, July 4, 2025. US Mobile is once again getting ready to offer its wild Pixel 9 deal, which will see the $799 phone drop down to just $249 on the carrier. The deal is valid for both new and existing US Mobile customers. The only catch is that the device will be locked to the carrier's network for 90 days of active service. New subscribers can avail themselves of the $249 Pixel 9 promotion on US Mobile with any unlimited plan, including Unlimited Flex, Unlimited Starter, or Unlimited Premium. Existing US Mobile subscribers on Unlimited or By-the-Gig plans for 90+ days can also participate in the Pixel 9 beta without switching their plans. The new US Mobile deal on the Pixel 9 goes live tomorrow, Friday, July 4, at 11 AM ET and will remain available while supplies last, so hurry up and snag your $249 Pixel 9 before stocks run out. The carrier has already sold out this deal twice before, so there may not be another chance for you to grab the flagship Pixel at this low price. Got a tip? Talk to us! Email our staff at Email our staff at news@ . You can stay anonymous or get credit for the info, it's your choice.

'I felt helpless': Bolton councillor hacked on holiday issues cybersecurity warning
'I felt helpless': Bolton councillor hacked on holiday issues cybersecurity warning

Yahoo

time13 minutes ago

  • Yahoo

'I felt helpless': Bolton councillor hacked on holiday issues cybersecurity warning

A Bolton councillor has issued a stark warning about online safety after falling victim to a sophisticated cyber attack while on holiday in Spain. Cllr Andrea Taylor-Burke, who also works as a financial director at Bolton-based tech firm In4tech Ltd, had her personal email and bank accounts compromised while enjoying a break in Benidorm. What began as a relaxing evening turned into a two-hour fight to regain control of her digital life after she received a series of unexpected notifications. Cllr Andrea Taylor-Burke had her accounts hacked whilst she was on holiday. (Image: Martini Archive) First, a bank alert for a £28.99 transaction in Canada, followed by password change emails and then a chilling "ransom" message from a hacker claiming full access to her data. 'I have taken control of your email account,' the message read. 'I have access to all of your online accounts and I know your passwords. 'Pay me £500 or I will share your personal details and photos online.' The hacker was not bluffing. Within minutes, they had accessed Cllr Taylor-Burke's online subscriptions, catalogue accounts and even began impersonating her in chatrooms. READ MORE: Worst of cyber attack impact to be over by August, says M&S boss Morrisons 'bounces back' from cyber attack despite pressure on shoppers They also uploaded a photo of themselves to her profile and gained access to sensitive financial details through her Google Wallet. 'The hacker was very advanced and ultimately telling the truth,' Cllr Taylor-Burke said. 'Not only was he using my bank card, but he was also logging into accounts I have with catalogues and subscriptions to change those passwords. 'He was chatting to people posing as me in chat rooms and all this in under 30 minutes.' The hacker was able to gain access to Andrea's accounts through Google Wallet. (Image: Martini Archive) Thankfully, her husband, who is an IT professional, had brought his work laptop on holiday and was able to launch what became a two-hour battle to kick the hacker out of her accounts. Andrea added: 'At the start, as quickly as we changed the passwords, he had them again. 'He had full control of my Google account and was seeing what we were doing. "This included my Google Wallet, which meant when the new card was issued by my bank this was instantly uploaded…so he was using the new card before I had even received it in the post.' She said: 'What would have happened if I wasn't married to an IT professional? "I'd have lost everything, all those precious photos of my babies, holidays, occasions and memories of my late mother.' Now, she is urging others to take urgent action to secure their digital lives. Andrea said: 'Workwise we all have extra security with two-step authentication, but like so many others it's easy to neglect your personal accounts. 'Hackers don't just attack big companies, they attack the smaller vulnerable people… those who don't know how to protect themselves or recover. 'What would you have done in my situation if you didn't have a IT professional to hand….pay the £500 ransom or risk losing all your personal details, photos and email accounts. "Can you risk this happening to you? 'Cybersecurity is so important. Are you secure?' Earlier this week, the boss of supermarket chain Marks & Spencer has said he hopes to have the majority of the impact from its damaging cyber attack 'behind us' by August. It comes after M&S was forced to halt online orders after it was targeted by hackers in April. Customer personal data – which could have included names, email addresses, postal addresses and dates of birth – was taken during the attack. M&S revealed that the hack was caused by 'human error' and would cost it around £300 million. If you have been the victim of a scam, fraud or online crime (cybercrime) you can report it to Action Fraud on 0300 123 2040 or on its website.

Google Play Store Warning—Find And Delete All Apps On This List
Google Play Store Warning—Find And Delete All Apps On This List

Forbes

time33 minutes ago

  • Forbes

Google Play Store Warning—Find And Delete All Apps On This List

Delete all these apps from your smartphone Here we go again. A list of malicious apps has just been published and smartphone users are being urged to root out and delete any still on their devices. The latest report outs more than 350 apps responsible for more than a billion ad bid requests per day. This latest report comes courtesy of Human Security's Satori team, which says it has 'disrupted IconAds, a massive fraud operation involving hundreds of deceptive mobile apps that hide their presence and deliver unwanted ads.' this app campaign has been under investigation for some time, but is growing its viral presence. Satori says this 'highlights the evolving tactics of threat actors,' and that the scale of threats such as this are similar to BADBOX 2.0, the major IOT threat flagged by the FBI and Google, in which millions of smart TVs and other devices Here is the list of IconAds issued by Human; and here is the list of previously known apps flagged by other researchers before this latest report was published. This AdWare follows on the HiddenAds threat, but on a much larger scale. The malware takes over devices with unwanted fullscreen ads, generating revenue for its handlers. It even changes app icons top avoid detection and removal. Global IconAds campaign 'While these apps often have a short shelf life before they're removed from Google's Play Store,' Sartorial says, 'the continued new releases demonstrate the threat actors' commitment to further adaptation and evolution. Google has now deleted all of apps in the report fromPlay Store, and users with Play Protect enabled will be protected from those apps. But apps are not automatically deleted from devices, and so you should do this manually. In Satori's technical report, it warns that such is the scale of this operation it deployed a dedicated domain for every malicious app, which helped the team compile their list. 'These domains consistently resolve to a specific CNAME and return a specific message; this means that while the domains were different, they very likely shared the same back-end infrastructure or second-level C2. These and other unique parameters allowed Satori researchers to find more of these domains and associate them back to IconAds.' The team also warns that the app obfuscation was highly deceptive. In one instance, an app 'used a variation of the Google Play Store's own icon and name. When opened, it automatically redirects into the official app while working in the background.' Satori says 'the IconAds operation underscores the increasing sophistication of mobile ad fraud schemes. Ongoing collaboration across the digital advertising ecosystem is essential to disrupting these and future fraud operations.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store