Technology
Contacts+: Excellent Tool for Daily Use
Contacts+ is a world leader in maintaining your contacts list. Once you install Contacts+, names from your phone-book are automatically imported into the app. When you have more than one telephone number per contact, it allows you to set the default telephone number.
 
With Contacts+, apart from using your phone for calls and SMS, you can open WhatsApp, Viber, Hangouts, email and more, directly from your contact list. So, you can operate all these apps from a single interface without jumping from one to the other. Birthday reminders are also built-in. Every morning, you are reminded of birthdays in the contact list.
 
In addition to blocking spam calls and SMS, Contacts+ provides protection to your phone contacts with an integrated backup service for your contacts, SMS and call logs. If you switch or lose your phone, no need to worry about your contacts.
The free version handles all the above-mentioned tasks effortlessly. The paid version gives you further extended backup options, has an efficient duplicate finder and a spam blocker. It also gives you 80+ customisable themes to make it look exactly the way you want it. An excellent tool for daily use.
 
 

User

COMMENTS

Nalini Murugan

6 months ago

We invested a lot of money. When we can get back?

Nalini Murugan

6 months ago

We invested a lot of money. When we can get back?

Kumar R

7 months ago

What about IoS? Seems very useful

How to Deal With Ransomware
As if there were not enough cyber attacks, a new wave of ransomware is emerging rapidly. This is not only affecting financial institutions, business and other organisations, but can also play havoc with individuals. Most of these cyber criminals demand money, to be paid using virtual currencies like Bitcoin. But there is no guarantee that you would be able to access all your locked data, even after paying. 
 
Ransomware is a type of software, or malware, that accesses content on your PC, laptop or mobile device and then scrambles the data. You are then required to pay the ransom so that the criminal can handover to you the key to the locked data. Ransomware, typically, spreads through spear phishing emails that contain malicious attachments in the form of archived content (zip/rar) containing a JavaScript file or specially designed web-links or URLs. After clicking on the file or the link, the ransomware executes itself on your computing or mobile device without any trace. After accessing data, it encrypts or locks the files and demands a ransom to allow you to restore access.
 
Once you are under attack, you cannot access any of your files or data stored on the device/s. Since ransomware has the capacity to spread rapidly, it can easily affect the entire network of shared drives or devices. Depending on the type of ransomware, you can see your files having extensions like ‘.cerber’, ‘.crypt’, ‘.zepto’, .locky, ‘.xtbl’, ‘.vault’, ‘xrtn’, ‘crySIS’, ‘.lock’, ‘.R5A’,  ‘.lock’,‘.wallet’ and ‘.dharma’. 
 
Some ransomware are designed in a way that it can identify and kill running processes like anti-virus or malware-detecting software. For example, in January, cyber criminals attacked a hotel in Austria and demanded ransom. While there were some confusing reports, in the end it was found that, during the attack period, the hotel was unable to use its reservation system and could not issue new key-cards to guests until the owner paid the ransom.
 
There are instances where the malware had remained idle for days or months before striking. Some are even capable of self-destruction. Adding to this is the Internet of things (IoT), which can really play havoc unless we are prepared to maintain cyber hygiene. Commenting on the ransomware attack against the Austrian hotel, Bruce Schneier, one of the most renowned security experts and chief technology officer of IBM Resilient, said in his blog, “I expect IoT ransomware to become a major area of crime in the next few years. How long before we see this tactic used against cars? Against home thermostats? Within the year is my guess. And as long as the ransom price is not too onerous, people will pay.”
 
Cyber security companies are working on decryption tools for such encrypted files. But, to date, decryption is possible for only some ransomware. For files for which the decryption tools are not available, there is no way to retrieve the private key that can be used to decrypt them. 
 
How do you guard yourself  Ransomware attacks?
 
1. Take regular backups of at least your critical data; 
2. Store this data on a device that is offline and not connected with any network;
3. Regularly update software on your computing and mobile device;
4. Block or do not open attachments with file types like exe, pif, tmp, url, vb, vbe, scr, reg, cer, pst, cmd, com, bat, dll, dat, hlp, hta, js, and ws;      
5. Use some tools that are available on the web, like Sophos: Hitman Pro, Malware bytes Anto-Ransomware, TrendMicro Ransomware Screen Unlocker and Microsoft enhanced mitigation and experience toolkit (EMET);
6. Do not open attachments in unsolicited emails, or even from people in your contact list, and never click on a URL in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs, close the e-mail and go to the website directly through a browser.
7. Disable remote desktop connections, if possible;
8. Stay away from installing or running unwanted software;
9. Avoid using external devices like a pen- or USB-drive from unknown sources.
 

 

User

COMMENTS

Mahesh S Bhatt

7 months ago

We have detailed 26 slides presentation & we work globally with Worlds largest Anti virus mitigation softwares So difficult to answer but good information for common man.Moneylife Cheers Mahesh Bhatt

Mahesh S Bhatt

7 months ago

We have detailed 26 slides presentation & we work globally with Worlds largest Anti virus mitigation softwares So difficult to answer but good information for common man.Moneylife Cheers Mahesh Bhatt

Mahesh S Bhatt

7 months ago

We have detailed 26 slides presentation & we work globally with Worlds largest Anti virus mitigation softwares So difficult to answer but good information for common man.Moneylife Cheers Mahesh Bhatt

Mahesh S Bhatt

7 months ago

We have detailed 26 slides presentation & we work globally with Worlds largest Anti virus mitigation softwares So difficult to answer but good information for common man.Moneylife Cheers Mahesh Bhatt

UPI bug costs Bank of Maharashtra about Rs25 crore
A bug in its unified payment interface (UPI) cost state-run Bank of Maharashtra (BoM) about Rs25 crore, say media reports. This exactly is the kind of 'rush' to join the digital platform bandwagon about which the Reserve Bank of India (RBI) had warned. But more about it later.
 
Quoting AP Hota, Managing Director and Chief Executive of National Payment Corp of India (NPCI), the company behind UPI, a report from Economic Times says, "Total amount of loss, as reported by BoM, is about Rs25 crore. They've recovered some amount and some amount is still pending. They've filed a police complaint also and the investigation is on."
 
Explaining the fraud, Mr Hota told the newspaper that the Pune-based Bank had procured an UPI solution from a vendor (reported to be city-based InfrasoftTech), which had a bug that resulted in the fund moving out of the accounts without the sender's account having the necessary funds.
 
Bank of Maharashtra had also accused 22 residents of Bhayander for hacking its central server in Mumbai and exploiting a flaw in the UPI mobile app to siphon off Rs1.42 crore from the bank. As per a report from Indian Express, investigations into the siphoning off of Rs1.42 crore from the Bank revealed that two of the accused allegedly committed a similar crime in Pune earlier this month. 
 
"The bank lost Rs6 crore between December 2016 and January 2017. In the latest case involving the Bhayander residents, exploiting a bug in the UPI app launched last year, the accused, having hacked the bank’s central server in Mumbai, made 142 'request money' transactions between 26 December 2016 and 18 January 2017," the report says.
 
Explaining the 'bug', a report from Times of India –ToI says, the 50 accused sent 'receive (transfer) money' requests in batches of up to Rs1 lakh each over 48 days. 
 
As per the procedure, when the UPI app receives such request, it sends a query to the other party (customer) and after obtaining acceptance, it checks fund availability in the UPI linked bank account. However, the UPI app used by Bank of Maharashtra, send two messages to NPCI, one as 'success' and other as 'error:insufficient funds'. In these fraudulent transactions, NPCI only read the first message and cleared the payment. 
 
"As a result, BoM's pool account with the RBI was deducted about 672 times over a period of 48 days," the report from ToI says.  
 
Earlier in January 2017, SS Mundra, Deputy Governor of RBI had warned that banks need to have a robust defence mechanism against cyber incidents at all times. He had said, "...our observation, however, is that many a times, certain finer details such as configuration of devices, patch management, OEM supported software, password management or port management, are ignored or entirely left to the vendors resulting in an undesirable impact. Statistics suggest that it takes on an average about six months to detect cyber-attacks by outsiders and longer in cases where attacks are by insiders. Thus, early detection and response assumes significant importance. Banks need to build capabilities to detect cyber-attacks early and respond to them quickly. Recovery from the incident is another aspect that needs to be well thought out."
 
Hope other banks are listening to the advice given by the apex bank and are doing the needful to safeguard customers.
 

User

COMMENTS

Sunil Ghotge

7 months ago

Anyways THE WORST BANK when it comes to service, in Branch or otherwise. Net Banking is full of hassles, what with the "additional layer" of "MahaSecure" ! Customers are left to fend for themselves with even the "support teams" either clueless or just acting as postmen to Branch, directing Customers to Branches which are ill-staffed with callous indifferent and disgruntled employees, with Branch Managers conspicuous by absence. Old Stone Age Banks, with ample scope for fraudsters while Customers are made to suffer.

Simple Indian

7 months ago

This is what happens when Banks jump on to the new tech platforms without sufficient IS audit of their systems. There are plenty of 3rd party vendors developing UPI Apps for various Banks. But, the onus of testing these thoroughly ought to be on the Banks before they choose to implement them for their customers. This is the flip-side of the Govt's Digital India push, as most PSU Banks are attuned to stone-age Banking practices and adopt new IT solutions reluctantly, if not grudgingly (often thanks to their status quoistic Employee Unions, who want Banks to remain in the stone-age to protect jobs of its staff, rather than move on to new-age cutting edge tech solutions to make Banking more efficient). RBI should have stringent guidelines for Banks on UPI and other such technological platforms, as unpleasant experiences will only make Banking customers switch back to cash-transactions.

SRINIVAS SHENOY

7 months ago

When detection of cyber-attacks by outsiders and insiders take such a long time, it would be prudent for allowing the system to stabilise, as banks are already reeling under huge mounting NPA losses, with recovery moving at a snails pace.

Ramesh Poapt

7 months ago

many a times, blessing become curse, and vice-versa!

We are listening!

Solve the equation and enter in the Captcha field.
  Loading...
Close

To continue


Please
Sign Up or Sign In
with

Email
Close

To continue


Please
Sign Up or Sign In
with

Email

BUY NOW

The Scam
24 Year Of The Scam: The Perennial Bestseller, reads like a Thriller!
Moneylife Online Magazine
Fiercely independent and pro-consumer information on personal finance
Stockletters in 3 Flavours
Outstanding research that beats mutual funds year after year
MAS: Complete Online Financial Advisory
(Includes Moneylife Magazine)