Saturday, March 15, 2025
HomeTechnologyKYOCERA Introduces Washable Smartphone

KYOCERA Introduces Washable Smartphone

Published on

SIEM as a Service

Follow Us on Google News

Rafre KYV40 is a successor to the first DIGNO rafre, which propelled in December 2015 as the world’s first hand-soap-washable smartphone.

Kyocera Corporation (President: Goro Yamaguchi)announced the arrival of the new rafre smartphone for Japanese service provider KDDI Corporation.This product is quite available only to the Japanese market.

Notwithstanding orignal DIGNO rafre, rafre KYV40 includes resistance against frothing hand soap, the second-era display has imperviousness to foaming body soap.

https://youtu.be/ylZgmWdhR3s

Like its predecessor, the new rafre highlights protection to boiling hot water and a touchscreen that be can be utilized notwithstanding when the client’s hands are wet or when wearing gloves.

The item will be available from March 2017 in Japan, and will be offered in three hues: Pale Pink, Clear White and Light Blue.

Key Features:

  1. Washable with foaming soap / touchscreen operation even when wet.
  2. Features cooking app that can be operated with hand gestures.
  3. Equipped with 13-megapixel camera and high-capacity battery 3,000mAh battery.
  4. Convenient, easy-to-use functions.

Find more @ globalkyocera

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Content Disarm and Reconstruction: Safeguarding Your Digital Environment

In today's digital landscape, cybersecurity threats continue to evolve at an alarming rate. Organizations...

The Role of Hacktivism in Modern Cybersecurity

The practice of hacking into computer systems or networks for political or social expression...

How Web3 Will Transform Online Commerce

Web3 is here, and the decentralized, blockchain-powered future of the internet is already changing...