SINGAPORE, Sept. 26, 2025 /PRNewswire/ — SUNMI, a global leader in smart commercial devices, announced a dual milestone with recognition from Google. The company has officially been named a Google Android Enterprise Gold Partner, becoming the first enterprise-focusedprovider in the Asia-Pacific region to receive this honor. At the same time, SUNMI’s flagship mobile point-of-sale (POS) terminal, the SUNMI L3, has earned the Google Android Enterprise Recommended (AER) certification. These two internationally recognized certifications consolidate SUNMI’s leadership in the global Android enterprise ecosystem. They also demonstrate the company’s world-class expertise in technology innovation, regulatory compliance, and enterprise-grade service capabilities, establishing a new global standard for connected commercial devices. Notably, this recognition positions SUNMI within the ranks of global technology leaders recognized by Google.

(PRNewsfoto/SUNMI)
(PRNewsfoto/SUNMI)

Dual Certifications Deliver Enterprise Value: Raising the Bar for Security, Efficiency, and Total Cost of Ownership

In global scenarios—including cross-border e-commerce and smart retail—SUNMI’s dual certifications create measurable advantages for enterprise customers.

  • One-click secure deployment: Built on the Google Android Enterprise platform, customers can configure and manage SUNMI devices seamlessly across international operations, protecting corporate data while safeguarding personal privacy.

  • Future-ready investment: Google’s guaranteed Android version and security patch updates extend the lifecycle of hardware deployments, ensuring a higher return on enterprise investments.

Technology Leadership: From Compliance to Real-World Impact

  • Scenario leadership: As an AER-certified BIoT mobile POS solution, the SUNMI L3 sets a benchmark, with more SUNMI products expected to follow. This achievement goes beyond baseline compatibility, demonstrating how SUNMI’s engineering is purpose-built to meet the demands of high-value global applications.

  • Global standards: Within the Android enterprise ecosystem, SUNMI has reached the industry’s top tier.

Earning the Google Gold Partner certification not only validates SUNMI’s technology leadership but also represents an important milestone in its global strategy. Frank Yuan, Head of Product at SUNMI, stated: “The dual honors are the outcome of SUNMI’s ‘technology + scenario’ strategy. We will continue to deepen our collaboration with Google to accelerate digital transformation across industries such as retail and food service, further positioning SUNMI as the partner of choice for businesses worldwide.” For corporate customers, SUNMI remains dedicated to delivering best-in-class products and a comprehensive Android enterprise platform.


Ledger Cryptotwitter


Source link

Read More


Google has long positioned its Messages app as a cornerstone of modern texting on Android, emphasizing Rich Communication Services (RCS) as a superior alternative to traditional SMS. But for users who root their devices or install custom ROMs, accessing this feature has become increasingly fraught. A recent development suggests Google is preparing to make its stance clearer: instead of allowing RCS chats to fail silently on such modified phones, the company may soon display an explicit error message citing security concerns.

This shift comes amid broader efforts by Google to tighten control over device integrity, ensuring that advanced features like RCS operate only on verified, unmodified hardware. Rooting, which grants users administrative access to alter system files, and custom ROMs, which replace the stock operating system, have been popular among enthusiasts for customization. However, these modifications can introduce vulnerabilities, prompting Google to restrict RCS functionality.

Emerging Transparency in Error Reporting

According to a report from Android Police, published on August 1, 2025, beta versions of Google Messages are testing a new notification that reads, “Your device isn’t secure enough for RCS chats.” This message would appear when users attempt to enable or use RCS on rooted devices, replacing the previous opaque failures where messages reverted to SMS without explanation.

The change aims to reduce user confusion, as many have reported issues without understanding the root cause—pun intended. Industry insiders note that this aligns with Google’s ongoing push for end-to-end encryption in RCS, which demands a secure environment to prevent interception or tampering.

Historical Context of RCS Restrictions

Flash back to early 2024, when reports first surfaced about Google quietly blocking RCS on rooted Android phones. A discussion on Reddit’s r/Android subreddit in March highlighted widespread frustration, with users sharing workarounds like Magisk modules to hide root status. Similarly, Android Authority detailed how Google’s campaign for RCS adoption ironically excluded a segment of its own power users.

These blocks were not arbitrary; they stemmed from Google’s Play Integrity API, which checks for device modifications. As 9to5Google reported in February 2024, unlocked bootloaders and custom ROMs triggered silent RCS denials, forcing fallback to less feature-rich SMS.

Security Imperatives Driving Policy

At the heart of Google’s decision is a commitment to security. RCS, unlike SMS, supports features like read receipts, high-quality media sharing, and encryption, but these require a tamper-proof ecosystem. Rooted devices could potentially expose users to malware or unauthorized access, undermining the protocol’s integrity. A Hacker News thread from March 2024, as captured on Y Combinator’s platform, echoed sentiments about the “war on general computing,” where users lament losing control over their devices.

Google’s approach mirrors broader industry trends, where companies like Apple have long restricted features on jailbroken iPhones. For Android, this means balancing openness with safety, especially as RCS gains traction globally.

Implications for Enthusiasts and the Market

For industry insiders, this evolution signals a maturing Android ecosystem where customization comes at a cost. Enthusiasts who root for ad-blocking or performance tweaks may need to weigh the loss of RCS against their modifications. Workarounds exist, such as spoofing device integrity, but they risk further restrictions as Google refines its detection methods.

Looking ahead, this could push more users toward stock experiences, bolstering Google’s control over messaging. As Android Police noted in a May 2024 piece on nerfed rooting benefits, the incentives for modification are dwindling, potentially reshaping the aftermarket ROM community.

Future Prospects and User Adaptation

Ultimately, Google’s move to explicit error messages may foster better dialogue with users, encouraging feedback on security trade-offs. With RCS now handling over a billion daily chats, as celebrated in a May 2025 Android Police update, the emphasis on secure devices underscores the protocol’s growth.

For rooted users, alternatives like third-party apps or unrooting remain options, but the message is clear: in the quest for seamless, secure communication, modifications may increasingly be sidelined. This policy refinement, while controversial, positions Google to lead in a more fortified messaging era.


Ledger Cryptotwitter


Source link

Read More






After all these years, Waze continues to be one of the best navigation apps available on Android and iOS. Despite Google Maps having attained many of Waze’s best features, the company continues to update Waze and offer new features for users to take advantage of. Unfortunately, if you’re running a device with Android 9 or an even older version of the operating system, your Waze app is about to stop receiving updates.

According to a post on Reddit, Google has started notifying Waze users with older Android devices that they’ll soon stop receiving new updates to the app. Android Authority has also backed up this news, noting that an APK teardown of the app’s latest beta version shows that it will require a minimum of Android 10 compared to previous versions, which supported both Android 8 and Android 9.

It’s not surprising to see Google pushing the app away from older versions, either, especially if it starts to lean on more AI-powered functionality, some of which requires newer hardware as well as the latest software.

You can still use Waze on older Android versions

While Waze won’t receive any additional updates, you’ll still be able to use the app on devices running older versions of Android that used to be supported, so long as you already have it installed. You just won’t get any additional support from Google. Alternatively, you could always switch to Google Maps, as it has integrated some of Waze’s best features — though not all of them.

If you don’t already have a newer device, and you’re running an older version of Android, then it might be time to upgrade. There are plenty of great Android devices out there, including the Samsung Galaxy S25, as well as the upcoming Pixel 10 lineup. You can usually find pretty good deals on slightly older devices, too, like the Galaxy S24 Ultra.

It’s unclear exactly when the new version of Waze will launch, ending updates for older Android devices, as no official announcement have been made at the time of writing. That said, if Waze is your navigation app of choice, it’s worth going ahead and deciding whether you want to keep using an app that no longer receives updates, swap to another navigation app, or finally upgrade your aging device.




Ledger Cryptotwitter


Source link

Read More


A sophisticated cybercrime campaign has been discovered targeting Android users through fake antivirus applications that actually deliver LunaSpy spyware to victims’ devices.

Security researchers have identified this malicious operation as an active threat that exploits users’ security concerns to gain unauthorized access to personal data and device functions.

The LunaSpy malware campaign has been operating since at least February 2025, spreading primarily through popular messaging applications.

Cybercriminals employ social engineering tactics by distributing the malicious software under the guise of legitimate antivirus and banking protection tools.

Victims typically receive messages from either unknown contacts or compromised accounts belonging to people in their contact lists, with simple instructions like “Hi, install this program here” accompanied by download links.

The malware also spreads through newly created Telegram channels that masquerade as legitimate software distribution platforms.

These channels appear frequently and can easily deceive users seeking security solutions for their mobile devices.

The attackers capitalize on users’ fear of malware infections and their willingness to install any application promising comprehensive protection.

Deceptive Installation Process

Once installed, the fake antivirus application performs convincing imitations of legitimate security software.

The malicious app conducts mock device scans and presents users with alarming reports indicating numerous detected threats on their smartphones.

These fabricated results are designed to frighten users into granting extensive permissions to the application, supposedly to enable it to remove the non-existent threats and protect the device.

This deceptive approach effectively manipulates victims into voluntarily providing the malware with access to all personal data stored on their devices, including sensitive information like passwords, messages, and financial details.

The latest versions of LunaSpy demonstrate increasingly sophisticated capabilities that enable comprehensive surveillance of infected devices.

The malware can steal passwords from both web browsers and messaging applications, highlighting the importance of using dedicated password management tools for enhanced security.

LunaSpy’s surveillance arsenal includes the ability to record audio and video through device microphones and cameras, access text messages and call logs, read contact lists, and execute arbitrary shell commands.

The spyware also tracks users’ geographical locations and can record screen activity in real-time.

Researchers have discovered dormant code within the malware designed to steal photos from device galleries, though this functionality has not yet been activated in current campaigns.

All collected information is transmitted to attackers through an extensive network of approximately 150 different domains and IP addresses serving as command-and-control servers.

Users can protect themselves by avoiding software installations from unofficial sources, carefully scrutinizing unexpected download requests, and using reputable security solutions from established vendors.

Regular security awareness and cautious online behavior remain the most effective defenses against such sophisticated social engineering attacks.

The Ultimate SOC-as-a-Service Pricing Guide for 2025– Download for Free


Ledger Cryptotwitter


Source link

Read More