logo
Sony Xperia 10 VII Leak Reveals 120 Hz OLED Display, Snapdragon 6 Gen 4, 50 MP Camera

Sony Xperia 10 VII Leak Reveals 120 Hz OLED Display, Snapdragon 6 Gen 4, 50 MP Camera

Yahoo28-04-2025
A new report has details of Sony's upcoming midrange smartphone, the Xperia 10 VII, ahead of its official launch. According to information from Sumaho Digest, the Xperia 10 VII will have a 6.1-inch FHD+ OLED display, keeping the same size as previous models. The phone stays small, at least by modern standards, which is a big win for many.
The report says the phone will likely get a 120 Hz refresh rate, a first for the Xperia 10 series. Sony will keep the device's 21:9 aspect ratio, which goes well with the company's approach to media consumption and multitasking.
This phone is set to have the Snapdragon 6 Gen 4 chipset, replacing the Snapdragon 6 Gen 1 found in last year's model. This new processor is about 10–15% more powerful on the CPU side, as reported by NotebookCheck. The phone is to have 8 GB of RAM and 256 GB of internal storage, with support for microSD.
For cameras, the Xperia 10 VII is to have a 50MP main sensor and an 8MP secondary rear camera. The front camera remains at 8MP. The phone is to have a dedicated physical shutter button. The battery capacity is to stay at 5,000 mAh. The phone will run Android 15 out of the box and have a side-mounted fingerprint sensor, NFC, dual SIM support, and USB Type-C connectivity.
Launch details are not confirmed, but the launch date is rumored to be May 15, 2025. Availability in North America remains uncertain.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

PS6 just tipped for huge specs upgrade to take on gaming PCs
PS6 just tipped for huge specs upgrade to take on gaming PCs

Yahoo

time11 hours ago

  • Yahoo

PS6 just tipped for huge specs upgrade to take on gaming PCs

When you buy through links on our articles, Future and its syndication partners may earn a commission. The PS6 could utilize 24GB of RAM, according to our friends at Digital Foundry (via Wccftech). That's speculation on their part, given how Sony hasn't officially announced the PS5's successor. However, PlayStation President Hideaki Nishino did say the company is thinking about its next-gen console during a June 13 fireside chat (via Dexerto). With that in mind, it's fair to speculate on how much memory the PS6 could have. The PS5 packs 16GB of RAM, so it's reasonable to assume the PS6 will utilize more RAM. That's because the PS5 is already hitting its limits when it comes to textures and art assets. 32GB of RAM would be nice, and comparable to the best gaming laptops currently available. However, to keep costs down, Sony might opt for 24GB of RAM instead. While that's lower than 32GB, it's still more than the PS5's 16GB. Also, DRAM is still relatively expensive, which could also limit the PS6's RAM. That said, there are a good number of gaming PCs and laptops with 24GB of RAM, so the PS6 could be a potential rival to those platforms. Additionally, Digital Foundry anticipates that the rumored PlayStation handheld will feature 16GB of RAM. If that happens, then it would make sense for the PS6 console to have at least 24GB of RAM. This is especially true if developers want to make games for both platforms. What about the next-gen Xbox? Rumors suggest Microsoft's system could more closely resemble a pre-built PC than a traditional video game console. If that's the case, the next Xbox could potentially utilize more RAM than the PS6. This next Xbox could be more expensive than the PS6, but this might not be detrimental if this platform's main competition is the best gaming PCs. The PS6 hasn't been announced, so take everything here as idle speculation from tech experts and enthusiasts. Regardless, it's a safe bet that Sony will eventually release a PS5 successor, given how the PlayStation division is the main revenue driver for the company. How much RAM will PS6 use? We'll just have to wait and see! Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. More from Tom's Guide Nintendo Switch 2 restocks — live updates Death Stranding 2 review Best gaming monitors in 2025

Leaked AMD ‘Magnus' APU could power the PS6 or next Xbox — here's what we've heard
Leaked AMD ‘Magnus' APU could power the PS6 or next Xbox — here's what we've heard

Yahoo

time11 hours ago

  • Yahoo

Leaked AMD ‘Magnus' APU could power the PS6 or next Xbox — here's what we've heard

When you buy through links on our articles, Future and its syndication partners may earn a commission. The APU for either the PS6 or the next Xbox might have just been revealed. YouTuber Moore's Law is Dead (via Wccftech) posted a video discussing an unannounced AMD Zen 6 APU codenamed 'Magnus.' This processor supposedly has a large 264mm squared graphics die with a 384-bit memory bus. As Wccftech explains, that's a wider bus than even the Xbox Series X's 320-bit bus. Magnus allegedly also packs 11 CPU cores featuring three Zen 6 cores and eight Zen 6 cores, which is a strange core count. What makes Moore's Law is Dead believe this APU is for the PS6? In the documents he discusses, he found other code names, such as Mero and Jupiter, with the former being an unused codename for the Steam Deck's APU and the latter rumored to be the APU for the equally rumored PlayStation handheld. In other words, these are chips for gaming systems and not the best gaming laptops. Given these codenames, the APU's square design (which MLID says looks similar to other Mark Cerny designs), and the CPU's weird core count, the YouTuber believes these are signs of a potential PS6 APU. That said, AMD leaker Kepler_L2 posted on X that they think the Magnus APU could be for the yet-to-be-announced next Xbox. Sony and AMD recently announced their partnership for the next Sony console. Microsoft has also stated that it's developing the next Xbox. Given those facts, it lends stories like this some credence. However, don't take any of this as gospel either. Regardless, we encourage you to watch the linked video above since it discusses a lot of fascinating details. In other PS6 news, we recently reported that Sony's next console could utilize 24GB of RAM, according to the experts at Digital Foundry. Given how the PS5 has 16GB of RAM, DF's speculation that the successor system will have at least 24GB of RAM seems reasonable. As for the next Xbox, it might have more than 24GB of RAM if it's indeed more akin to a gaming PC, as some have speculated. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. More from Tom's Guide Nintendo Switch 2 restocks — live updates Death Stranding 2 review These are the best gaming monitors in 2025

Bluetooth flaw exposes millions of premium headphones to spying
Bluetooth flaw exposes millions of premium headphones to spying

Fox News

time14 hours ago

  • Fox News

Bluetooth flaw exposes millions of premium headphones to spying

Bluetooth headphones are supposed to make life easier. You put them on, press play and forget they exist. But researchers have found that some of the most popular audio products on the market might be doing more than streaming your playlist. Cybersecurity firm ERNW has revealed that 29 devices using Airoha Bluetooth chips are vulnerable to attacks that could expose your personal data or let someone snoop on your conversations. The affected devices come from well-known brands, including Bose, Sony, JBL, Jabra and Marshall. They include headphones, earbuds, speakers and wireless microphones. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide —c free when you join my The Bluetooth flaws in question are built into Airoha chips commonly used in true wireless audio devices, as reported by BleepingComputer. Three flaws were disclosed, each allowing an attacker to gain some level of unauthorized access. The most serious flaw lets an attacker read or manipulate data by exploiting a custom protocol used by the chip. All three flaws have been assigned official CVE numbers and scored between medium and high severity. To be clear, these are not casual attacks. They require close proximity and technical expertise. But when successful, the results are concerning. Researchers showed that they could extract call logs, contact lists and media being played. They could even force a phone to place a call without the user's knowledge. Once connected, they could listen in on any sound the phone picked up. In one proof-of-concept, the researchers retrieved Bluetooth link keys from a headphone's memory. This allowed them to impersonate the device and hijack the connection to the phone. With that access, they could issue commands using the Bluetooth Hands-Free Profile, a feature available across most modern phones. ERNW researchers have identified the following devices as vulnerable: Keep in mind that this list may not include every product affected by these vulnerabilities. As more research emerges, the list could change. Furthermore, not every device faces all the same risks. For instance, at least one manufacturer seems to have already addressed CVE-2025-20700 and CVE-2025-20701. However, we do not know if this fix was intentional or accidental. Because of these factors, getting a complete and accurate picture of which devices are truly secure remains a challenge. As a consumer, you should stay alert for updates and check with your device's manufacturer for the latest information. Airoha has addressed the vulnerabilities in its software development kit (SDK) and released an updated version to device manufacturers in early June. These manufacturers are now responsible for building and distributing firmware updates to affected products. If you haven't seen an update yet, it should be arriving soon, though some may already be available. However, there's a catch. According to a report by German outlet Heise, many of the most recent firmware updates for affected devices were released before Airoha provided its official fix. This means some products may still be running vulnerable code, despite appearing up to date. To make matters more complicated, consumers typically aren't notified directly about these updates. Firmware patches for headphones and similar devices often install silently, or in some cases, may not be delivered at all. As a result, most users have no way of knowing whether their devices are secure or still exposed to risk. We reached out to all 10 companies for a comment, but did not hear back before our deadline. 1. Regularly check for firmware updates: Visit the manufacturer's app or website to manually check for firmware updates, even if you haven't received a notification. Automatic updates aren't always reliable, especially for headphones and earbuds. 2. Turn off Bluetooth when not in use: Disabling Bluetooth when you're not actively using it reduces your exposure window and makes it harder for attackers to target your device. 3. Use devices in low-risk areas: Since these attacks require close proximity, avoid using Bluetooth audio devices in crowded or unfamiliar public places where someone nearby could exploit vulnerabilities. 4. Pair devices with trusted sources only: Avoid pairing your Bluetooth headphones with unfamiliar phones, computers or public terminals. Once paired, those devices can sometimes maintain a connection or reestablish one without your knowledge, increasing the risk of abuse if they're compromised. 5. Remove unused paired devices: Go into your Bluetooth settings and delete old or unfamiliar pairings. This helps prevent unauthorized reconnections from previously trusted devices that may now be compromised. The real concern here isn't the Bluetooth flaw itself, but what happens when the software inside everyday devices fails quietly. Vulnerabilities like this aren't unusual, but the way they are handled often leaves users in the dark. As long as consumers can't see or control the software running inside their own headphones, problems like this will keep happening. Should manufacturers be required to notify users directly when security flaws are discovered in their products? Let us know by writing us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store