
Samsung adds Gemini AI shortcut in Galaxy A series mobiles: How to enable it?
Samsung is rolling out a new software update that will allow select Galaxy A series smartphones to activate their AI assistant, Gemini, directly through the side button. Previously available on the flagship Galaxy S models, this feature is now extending to more devices, which reflects Samsung's effort to integrate AI capabilities across its product lineup.
The update brings an enhanced experience to the Galaxy A56 5G, A36 5G, and A26 5G models, enabling users to press and hold the side button to instantly launch Gemini. This update provides quick access to AI tools, making it easier for users to perform tasks such as checking calendars, generating gift ideas, or finding nearby restaurants, all through voice commands.
Also read: Samsung Galaxy S24, S24 Plus, and S24 Ultra get a huge price cut in Amazon Summer Sale
Additionally, Gemini can interact across different apps, which will allow users to, for example, search for a fine-dining cafe on Google Maps and share it through Samsung Messages, all with a single voice prompt. The integration of this AI assistant enhances the user experience without increasing the cost of the device.
To activate Gemini on compatible devices, follow these steps:
Also read: iPhone 16, iPhone 16 Pro, iPhone 15 get a huge price drop during Amazon Great Summer Sale - Details
Jay Kim, Executive Vice President at Samsung's Mobile eXperience division, highlighted that this update is part of a broader initiative with Google to enhance AI functionality across Samsung devices. The software update will begin rolling out globally in early May 2025, with more Galaxy A models expected to receive it in the coming months.
In addition to the Gemini integration, Samsung's One UI software continues to evolve. The release of One UI 7, based on Android 15, is set to enhance the user interface for Galaxy devices. The stable One UI 7 update began rolling out in April 2025, following a beta phase that started in December 2024.
Also read: Best apps that use the NPU on a Snapdragon Windows laptop

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Mint
42 minutes ago
- Mint
Google Search now shows AI-generated weather snapshots for select users: Report
Google is reportedly testing a new artificial intelligence (AI) feature that provides users with brief, text-based summaries of current weather conditions directly within its mobile Search experience. The feature, which is currently limited in availability, has been spotted by some users in the United States when searching for city-specific weather information through the Google app on Android and iOS. According to a report by9to5Google, the AI-powered summary appears between the standard hourly and 10-day forecast sections and aims to offer an at-a-glance understanding of the weather. The brief narrative includes key details such as wind conditions, the likelihood of rain or thunderstorms, atmospheric pressure patterns, and trends in temperature fluctuations. At present, the feature seems to be in an early testing phase, with visibility restricted to certain regions. Searches for 'weather Los Angeles' and 'weather San Diego' reportedly triggered the new summary, whereas other locations did not yield the same result. Mint was also unable to access the summaries for the mentioned cities, indicating that the rollout is likely limited to a small user group. In addition to the text description, the AI-generated section includes a small icon linking to external sources for more comprehensive weather information. Beneath the summary, Google has added a disclaimer that reads: 'Generative AI is experimental,' reinforcing that the tool is still in a testing stage. Currently, the new feature appears only within the Google app and on the mobile web. It does not show up on desktop platforms or when users are not signed into their Google accounts. Google has not yet announced any plans for a wider rollout or confirmed when the feature might become broadly available. The addition comes as part of the tech giant's ongoing efforts to integrate generative AI into its suite of services, offering more contextual and user-friendly information across its platforms.


Time of India
an hour ago
- Time of India
Google says hackers are using fake Salesforce app to attack businesses
Hackers are targeting employees at companies across Europe and the Americas using a sophisticated social engineering campaign involving a modified Salesforce app, 's cybersecurity arm has said. Tired of too many ads? go ad free now According to Google's Threat Intelligence Group (GTIG), the attackers—identified as UNC6040—have been 'particularly effective' in deceiving corporate users into installing a fake version of Salesforce Data Loader , a legitimate tool used for importing large datasets into Salesforce environments. How hackers are targeting large companies The team at Google explains that the hackers impersonate official Salesforce representatives and are calling employees to direct them to a fake app setup page. There, users are tricked into authorising a malicious version of the Data Loader app that mimics the original software. Once installed, the app grants attackers significant access to sensitive corporate data. Google researchers noted that the hackers can exfiltrate confidential information, query internal systems, and in many cases, pivot to attack other cloud services and internal networks. As per the researchers, technical indicators suggest that the campaign has ties to 'The Com', a loosely organised cybercriminal ecosystem known for orchestrating both online fraud and real-world violence. What Google and Salesforce have to say A Google spokesperson told news agency Reuters that at least 20 organisations have been affected by the UNC6040 operation over the past several months, with some suffering successful data breaches and extortion attempts. Meanwhile, Salesforce, stated that the issue does not stem from any vulnerability in its platform. A company spokesperson emphasised that the attacks rely on voice phishing (vishing) tactics and exploit gaps in employee cybersecurity awareness. Tired of too many ads? go ad free now 'There's no indication the issue described stems from any vulnerability inherent in our platform,' the spokesperson said, adding that the number of affected customers is small and the threat is not considered widespread. Salesforce had previously issued a warning in March 2025, cautioning users about vishing attacks and the risks posed by malicious versions of Data Loader. Stay ready with these 7 essential medical gadgets as COVID cases rise
&w=3840&q=100)

Business Standard
an hour ago
- Business Standard
Hackers posed as IT staff to steal Salesforce data from firms: Google
A hacking group has been impersonating IT personnel to break into companies' Salesforce tools, using the access for data theft and extortion, according to a new report from Google's threat intelligence group. The hackers, which have links to a loosely affiliated group of hackers largely based in the US, UK and Western Europe called the Com, successfully breached the networks of at least 20 companies in the US and Europe, Google said. They operate by calling up employees and pretending to be IT support personnel, convincing them to provide sensitive credentials and using that to steal Salesforce data, Google said in the report published Wednesday. In some cases, the hacker was able to fool an employee into connecting a malicious app to their organisation's Salesforce portal, allowing the hacker to steal Salesforce data. Some victims didn't receive an extortion demand in exchange for the deletion of the data until months after it was stolen, according to the report. The hackers relied on manipulating its victims, not any vulnerability in Salesforce tools, Google said. 'There's no indication the issue described stems from any vulnerability inherent to our services,' a Salesforce spokesperson said in an email. 'Attacks like voice phishing are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' In a March blog post, the company noted that threat actors had been using social engineering techniques to break into its customers' Salesforce accounts, and it provided guidance to protect against such attacks. Google's report comes as a string of retailers have been hacked in recent months. Marks & Spencer Group Plc is facing a £300 million ($406 million) hit to operating profit this year due to a ransomware attack in April. Fellow British grocer Co-op Group disclosed shortly afterward that it too was the victim of a cyberattack. Adidas AG and Victoria's Secret & Co., Cartier and North Face have also disclosed cybersecurity incidents in recent weeks. Google's report didn't identify specific victims. 'While we've seen this group target retail, they have also targeted other industries and we do not have enough information to definitively link this group to the recent hacks in the US and UK more broadly,' said Austin Larsen, principal threat analyst at Google Threat Analyst Group. The hacking group used infrastructure and methods previously used by members of the Com, Google said. Members of the hacking group Scattered Spider, which was accused of a raft of high-profile attacks in recent years, many of which involved impersonating IT staff, have also been linked to the Com, made up mostly of young male SIM-swappers who organized on social media channels to steal cryptocurrency by taking control of victims' phone numbers. Google urged companies to remain vigilant against so-called social engineering attacks. (Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)