logo
Google's Android Beta 16 includes support for Auracast

Google's Android Beta 16 includes support for Auracast

Yahoo13-03-2025

The new Android 16 beta build released today for developers will include support for Auracast, which enables earbuds and hearing aids to connect to public and private audio streams thanks to the Bluetooth LE standard. A demonstration of Auracast technology at CES 2024 showed how it could be used in environments where public service announcements can be difficult to hear for all of us, but particularly those with hearing impairment. We've been excited about the technology for a while now, and the Android 16 beta support is a great step forward for broader implementation.
The new update will allow compatible devices — be it hearing aids from GN Hearing or Starkey, or earbuds like the JBL Tour 3 Pro — to receive broadcasts from compatible TVs or public transmitters with Samsung Galaxy devices with One UI 7, Android 15, or Google Pixel 9 devices running the Android 16 beta. For those connecting with a hearing aid, your hearing aid presets will be applied to the broadcasts. With the update, Google is rolling out the ability to connect to broadcasts with a QR code instead of needing to go into the devices settings. The QR code implementation will be available first on Pixel 9 devices.
As Auracast gets supported in more products, there's great potential for use in our everyday lives. This includes far more flexibility while watching TV — either with the placement of Aurcast-enabled speakers throughout a room, or multiple people being able to listen to the same broadcast with different language options of frequency boost settings for intelligibility — or being able to connect to an audio stream specific to your gate at the airport for boarding or (God forbid) delay notifications. It also means you'll be able to use your own headphones, earbuds, or hearing aids to connect to the stream — as long as they have Auracast enabled. The inclusion of Auracast leads to better auditory accessibility, and we're here for it.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Google delays rollout of its ‘Ask Photos' AI search feature
Google delays rollout of its ‘Ask Photos' AI search feature

TechCrunch

time33 minutes ago

  • TechCrunch

Google delays rollout of its ‘Ask Photos' AI search feature

In Brief Google is delaying the rollout of its 'Ask Photos' feature for about two weeks, Google Photos product manager Jamie Aspinall wrote on X. According to Aspinall, the product isn't up to par when it comes to latency, quality, and user experience. While some users have access to the feature now, he said that a new version will be shipped in about two weeks, which will aim to correct these issues. Google first announced the Ask Photos feature last year at its annual Google I/O developer conference. With the help of Google's Gemini AI model, Ask Photos allows users to search their Google Photos libraries using natural language prompts. A user could ask, for example, for a sample of one great photo from each of their visits to a National Park. one of my favorite examples of Ask Photos@googlephotos — Jamieasp (@jamieasp) May 14, 2024 Google did not respond to a request for comment before publication.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

time38 minutes ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

time43 minutes ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store