300 kmph BMW’s Batman Electric Powered Wingsuit


 300 kmph BMW’s 

Batman Electric Powered Wingsuit

A normal wingsuit can achieve a speed of 100 kmph, but this one designed by BMW can do three times more at 300 kmph

Highlights

  • Peter Salzmann came up with the original design
  • It can achieve speeds of up to 300 km/h
  • Non electrified wingsuits can only attain 100 km/h 

BMW is usually known for its cars and its EV technology which focusses on electric vehicles. But it has also been working on a wingsuit which is literally out of Batman. The electric wingsuit has been in the works for three years which started off as a concept by Peter Salzmann who is a Professional Wingsuitpilot / Basejumper / Skydiver / Paragliding Instructor & Tandempilot. Then it turned into a collaboration between BMW i and Designworks, which brought the electric wingsuit to life which has now been tested by Peter Salzmann. 


NAZIA NASIM is KBC12’s first crorepati - Watch this iconic moment in KBC12 on 11th Nov 9 pm only on Sony TV

NAZIA NASIM is KBC12’s first crorepati - 

Watch this iconic moment in KBC12 on 

11th Nov 9 pm only on Sony TV



Income Tax refunds worth Rs.1.29 Lakh crore issued to over 39 Lakh taxpayers.

 Income Tax refunds worth Rs.1.29 Lakh

crore issued to over 39 Lakh taxpayers.

  1. CBDT issued refunds of over 1.29 Lakh Crore to more than 39.49 lakh taxpayers between 1st Apr'20 to 3rd Nov'20.
  2. Income Tax refunds of Rs. 34,820 crore issued in 37,55,428 cases.
  3. Corporate Tax refunds of Rs.94,370 crore issued in 1,93,059 cases.


Income Tax refunds worth Rs.1.29 Lakh crore issued to over 39 Lakh taxpayers.

SBI ATM cash withdrawal rules have changed

 


SBI ATM cash withdrawal rules have changed

India's largest lender State Bank of India (SBI) has already changed its rules related to OTP-based cash withdrawal from ATMs. Effective September 18, SBI announced the extension of time for OTP-based cash withdrawal from ATMs, thus giving the customers a wider window period.


petition.republicworld.com RED PROBE INTO THE SUSHANT SINGH RAJPUT DEATH CASE

 petition.republicworld.com

RED PROBE INTO THE SUSHANT SINGH RAJPUT DEATH CASE

WHAT IS THIS PETITION?

This is a petition to demand that the investigation into the death of Sushant Singh Rajput be transferred to an independent and impartial organisation for a Supreme Court monitored time bound inquiry. We believe nothing short of this will bring the whole truth out.

Join the Republic Media Network Campaign for #CBIForSSR to ensure that the cloud over the circumstances of actor Sushant’s death are removed, that the truth prevails, and that those who have compromised the investigation so far face penalties under the law.

Forbes Corona Guard - Tech to fight COVID - CORONAGUARD

Forbes Corona Guard - Tech to fight COVID - CORONAGUARD

CORONAGUARD DEVICE FOR CORONA

A powerful but small device that attacks and disables Coronavirus from infecting people under the Brand name Forbes CORONAGUARD (Powered by SHYCOCAN).

It Reduces infection

Salient features:

  1. Conceptualised and made in India 

  2. Attacks, detects, disablesand protects against 99.9% Corona 

  3. Chemical free, odour free, stain free and no side effects

  4. Easy to install 

One Device covers 1000 sqm Area

It gives high energy photons. 

If COVID Patient sneezes in Room and you are close to it, then you can also protected. No need of Mask.
What is Does : Attacks and disables 99.99% Coronavirus, including SARS-CoV-2, in the air and surfaces, within closed walls.

It can used in closed spaces in places of Health care facilities, Grocery and essential stores, restaurants, hotels, schools, colleges, gymps, places of worship, residential corporate industrial among others.











BEWARE OF SCREEN SHARING FRAUD - SBI CARD - See how fraud cheats you

BEWARE OF SCREEN SHARING FRAUD - 
SBI CARD

See how fraudsters use screen sharing App and cheat you. Read the complete information below.

CERT-In guidelines for conducting cybersecurity audits in the pandemic induced disruption

ased on the analysis and discussion with both auditee and auditing organisations ,

CERT-In has prepared the guidelines applicable for both auditee and 
auditing organisations to conduct quality cyber security audits in pandemic situations.

GUIDELINES FOR CONDUCTING CYBERSECURITY AUDITS IN THE PANDEMIC INDUCED DISRUPTION

Indian Computer Emergency Response Team (CERT-In) has created a panel of cybersecurity auditing organizations for conducting cybersecurity audits, including compliance audits, vulnerability assessment and penetration testing of computer systems, networks & applications of various organizations of the Government and those in other sectors of Indian economy.

List of 59 Mobile Application Banned by Government of India

Government Bans 59 mobile apps which are prejudicial to sovereignty and integrity of India, defence of India, security of state and public order. The list includes Tik Tok, CamScanner,Share it,We chat.

Government Bans 59 mobile apps

Press Release : Government Bans 59 mobile app which are prejudicial to sovereignty and integrity of India, defence of India, Security of state and public order.



Ques : The name of which religion comes from the sanskrit root word "shishya" meaning "discipline"?

Ques : The name of which religion comes from the sanskrit root word "shishya" meaning "discipline"?

Options are :

A. Hinduism

B.  Sikhism

C.  Jainism

D.  Buddhism

Correct Answer : B.  Sikhism

Which is the first state the River Brahmaputra flows through on entering India?

Ques : Which is the first state the River Brahmaputra flows through on entering India?

Options are :

A.  Assam

B.  Meghalaya

C.  Arunachal Pradesh

D.  Nagaland

Answer will be : C.  Arunachal Pradesh

Ques : Where in China was the coronavirus disease 2019, or COVID-19, first identified? - KBC First Registration Question 2020

Here is the first Registration Question asked on 9th of May

Where in China was the coronavirus disease 2019, or COVID-19, first identified?

Ques : Where in China was the coronavirus disease 2019, or COVID-19, first identified?

Options are :

A. Shenzhou

B. Wuhan

C. Beijing

D. Shanghai

KBC Registration will begin from 9th of May at 9 PM on Sony TV

KBC 2020 : Are you Ready

KBC Registration will begin from 9th of May at 9 PM on Sony TV

Kaun Banega Crorepati is going to be on air this year 2020. The first step of Registration will begin soon from 9th of May. 

Stay tuned to the Sony TV for more information. The mode of Registration will be via Sonyliv App and SMS and IVRS. Get ready to participate in the Registration Process.

KBC Registration will begin from 9th of May at 9 PM on Sony TV 2
Amitabh Bachchan is the host of the Show. Many dreams comes true on the Hotseat of KBC. If you have dream of making your dream fulfill then you must go there. Stay connected with the Scholars Club for more information.


PFMS : Know your Bank account Balance by only Account Number

PFMS : Know your Bank account Balance by only Account Number

Ministry of Finance has issued a website on the name of PFMS "Public Financial Management Service".

With the help of this service, a user can know if he has received some government benefit in his account or not.

Know Your Account Balance

Direct Benefit Transfer (DBT)
Transferring subsidies directly to the people through their bank/Post office account is Direct Benefit Transfer. It aims to timely transfer of benefit to the citizen by bringing efficiency, effectiveness, transparency and accountability in the Government system. Through the DBT Government intend to achieve electronic transfer of benefits, reduce delays in payments and most importantly, accurate targeting of beneficiaries, thereby curbing leakages and duplication.

Centrally Sponsored Scheme (CSS)
Under Centrally Sponsored Scheme (CSS) a certain percentage of the funding is borne by the States in the ratio such as 50:50, 70:30, 75:25 or 90:10. It is implemented by the State Governments. Centrally Sponsored Schemes are formulated on subjects under the State List to encourage States to prioritise in areas that require more attention.Funds are routed either through consolidated fund of States and or are transferred directly to State/ District Level Autonomous Bodies/Implementing Agencies.

Central Sector (CS) Scheme
Central Sector Schemes are those that 100% funded by the Union government implemented by a central government agency. These schemes are mainly formulated on subjects within the union list.

What is Docker and Virus Alert :Kinsing malware Type: Cryptojacking Worm

What is Docker and Virus Alert :Kinsing malware Type: Cryptojacking Worm
Virus Alert :Kinsing malware
Type: Cryptojacking Worm

Systems Affected: Docker containers

Docker is a technology that allows us to perform operating system level virtualization. A large number of organizations are using Docker to develop, deploy and run applications inside containers. Recently several cases of abuse of the systems running misconfigured Docker Engine have been reported. A new malware “Kinsing” is reported that hunts for misconfigured publicly exposed Docker services and infects them with containers that run crypto miners.

Download Vedas in English and Hindi - Sama Veda, Yajur Veda, Atharva Veda

Vedas' which have originated form India has four parts Sama Veda, Yajur Veda, Atharva Veda and Ayur veda. All the four Veda has all the knowledge of the world. we are making available  for you all in an easy way.


  1. Sama Veda : Download File
  2. Yajur Veda : Download File 1, Download File 2
  3. Atharva Veda : Download File 1 , Download File 2
  4. Four Vedas in English : Download Now
Samved Download Free

yajur veda Download

Arthveda Download

Fake UPI IDs circulated on the pretext of "Prime Minister's Citizen Assistance and Relief in Emergency Situations Fund


Fake UPI IDs circulated on the pretext of "Prime Minister's Citizen Assistance and Relief in Emergency Situations Fund"


CERT-In has tracked several fake UPI IDs which are similar to the UPI ID used by the "Prime Minister's Citizen Assistance and Relief in Emergency Situations  (PM-CARES) Fund" - pmcares@sbi
Following are some of the fake UPI IDs which have been observed:

pmcares@pnb

pmcares@hdfcbank

pmcare@yesbank

pmcare@ybl

pmcare@upi

pmcare@sbi

pmcares@icici

It may be noted that the genuine UPI ID is "pmcares@sbi"and registered account name is "PM CARES". It is advised that citizens may verify the UPI ID and registered name before making any donations. For further details of PM CARES fund, citizens and organisations are advised to visit the website


1. Citizens and Organizations can go to the website pmindia.gov.in and donate to PM-CARES Fund.



iPhone is going to be banned in India! TRAI ordered

TRAI is going to ban iPhone in India.

The heart of the matter in this case is the TRAI’s DND 2.0 App which TRAI has mandated all “Access Providers” to include in their App Stores.

The heart of the matter in this case is the TRAI’s DND 2.0 App which TRAI has mandated all “Access Providers” to include in their App Stores. This app not only allows a user to block spammers like tele marketing services, insurance companies, credit card companies, etc. but also helps TRAI to track in real time who those spammers are and instantly blacklist them or take action against them.

“EVERY ACCESS PROVIDER SHALL ENSURE, WITHIN SIX MONTHS’ TIME, THAT ALL SMARTPHONE DEVICES REGISTERED ON ITS NETWORK SUPPORT THE PERMISSIONS REQUIRED FOR THE FUNCTIONING OF SUCH APPS AS PRESCRIBED IN THE REGULATIONS 6(2)(E) AND REGULATIONS 23(2)(D),” STATES THE TRAI DIRECTIVE.

So basically, its not about iPhones per se, but Apple not making this app available in their App Store which is causing discomfort to TRAI. While Google took heed of TRAI’s directive and included this app in their Android Play Store immediately, Apple is holding this app citing more intrusive access permissions resulting in user’s breach of privacy:

DND 2.0 app in Android Play Store


Now where does the question of intrusive access permissions arise? As I said, the app not just blocks the spammer for that particular smart-phone user, but also sends back telephonic data to TRAI in real-time so that TRAI can get to know who the spammer is and block them in their database too. In order to do that, TRAI needs to collect some data through the app which requires some aggressive access to telephony, call logs, etc. and this is where the disagreement arises between Apple and TRAI – Apple doesn’t want to allow the app in their store as it believes that it violates their user’s privacy.

Apple had similar privacy tussles with other app developers before too, most notably, Uber. More than care for user privacy, I think its a perception battle for Apple. Since Google doesn’t seem to have any grand ambition to come off as a privacy champion for their users (they earn mostly through advertising revenue), they didn’t give any second thoughts before allowing the DND 2.0 app in their Play Store. But since Apple is facing declining sales in their Macbook Pro and iPhone lines with growing number of Chinese competitors in recent years, they are trying to secure their only advantage in the game which others don’t have – User Privacy.

Apple is playing the long game here. Considering that European Union passed the GDPR laws last year and other countries are about to follow suit soon, Apple understands that Privacy is going to be a huge selling point in coming years across the world, especially in technology business. Hence, it appears that Apple is even willing to forego as large a market as India in order to maintain their privacy standards.

MALWARE FAMILIES RELATED TO COVID-19 - CYBER ATTACKS

CORONAVIRUS PANDEMIC [COVID-19] BASED CYBER ATTACKS

Novel Coronavirus, originated in December 2019 is a viral disease spread worldwide.  It has been reported that Threat Actors are using the COVID-19 pandemic as a cyber attack vector for their own notorious gains. 

Cyber criminals are taking advantage of victims increased craving for information about the Novel Coronavirus due to fear and uncertainity associated with it as the outbreak of the disease is progressing worldwide.

ATTACK STAGES- 

PRIMARY SET OF ATTACKS: 

The Threat actors employed references related to COVID-19 in phishing attacks to steal information and drop additional malware. 

TACTICS AND ATTACK PROCEDURES INVOLVED POST INITIAL PHASE OF ATTACKS: 

Threat actors devise following new strategies to target victims with scams or malware campaigns:

Use of Legitimate corporate branding in the name of COVID-19 to send malware to victims
Using names of trusted organizations in phishing attacks in order to attain credibility and to lure victims to further open attachment Using promotional code Coronavirus Maps
"COVID19" as discount codes used by different hacking groups to promote their goods (malicious malware or exploit tools) for financial gain sold over dark net Trojan being delivered via Android app that lures victims offering Coronavirus safety mask upon installation. Coronavirus tracker App that takes away access of android microphone and camera once installed.

MALWARE FAMILIES RELATED TO COVID-19:

  1. AGENT TESLA
  2. TRICKBOT
  3. LOKIBOT
  4. EMOTET
  5. TRICKYMOUSE
  6. VICIOUS PANDA CAMPAIGN
  7. AZORULT
  8. CRIMSON RAT
  9. COVIDLOCK


Best Practice and Recommendations

The majority of the infections are primarily introduced via phishing emails, malicious adverts on websites, and third-party apps and programs. Hence, thoughtfully designed security awareness campaigns that stress the avoidance of clicking on links and attachments in email, can establish an essential pillar of defense. Allow remote access to the organization's network strictly with two-factor authentication. Systems having antivirus and a malware protection program on it and making sure they are always up to date with latest signatures.

Administrators applying strict application whitelisting, blocking unused ports, turning off unused services, and monitoring outgoing traffic to prevent infections from occurring.

Checking all services and devices for remote access for updates of firmware and security patches. Internet-facing open ports of remote-control services are a key target for attacks. Disable use of Macros in Microsoft office. COVID-19 used VBA Macros as an initial step for targeting victims. 

BEWARE OF SCREEN SHARING FRAUD : SBI Card , SBI Net Banking and Yono App

Screen Sharing Fraud is a new way for online scammers to
gain access to your personal and financial information.
Fraudsters are on a lookout to defraud by convincing you to download
a third party application and get full control over your device.

Protect your SBI Card from frauds

SCREEN SHARING FRAUD:


WHAT IT IS?
Screen Sharing or Mirroring App Fraud is a new scam where Fraudsters ask users to install a third party screen-sharing application in order to assist you online or to update some documents. These apps may or may not be malware, but they do grant complete access of your device to the scammer.

There are hundreds of free screen-sharing application available all over the internet. These apps were originally used by engineers to fix issues on a phone/computer from a remote location. These apps allow full access and control to the user’s device.

HOW IT WORKS?

Fraudster approaches the user imposing to be from a financial institution/bank or an online service provider.
They will ask user to download a third party screen-sharing application on their device to solve an issue immediately.
Instead of asking user to share their card, bank details, UPI PIN or OTP, fraudster will ask users to type in the details.
While user thinks they are being helped, fraudster use the opportunity to record the user’s card number, CVV code and send an OTP for transferring funds into their own account through an SMS.
Remember, screen-sharing apps allow access to your device. Fraudsters view the OTP received on the user’s device and use it for transferring funds to their own account.
SAFETY TIPS:


Do not download any unknown/unauthorized application on your device.
Do not permit any third-party application to be installed on your device.
If you see any notification asking you to allow a particular application to make changes to your device immidiately 'Deny' and decline.
Report any such call/suspicious activity on the helpline number mentioned at the back of your credit card.
ALWAYS REMEMBER:
SBI Card will never ask you to install any third-party application on your device.
Do not install an application on anyone's request. It may be used to grant full control of your phone/laptop/desktop/tablet to the person on the other end
and help him/her view your personal and financial information such as card credentials/account details/personal photographs from a remote location.


Vishing

What is Vishing?
Vishing is a combination of Voice and Phishing that uses Voice Over Internet Protocol (VOIP) technology, wherein, fraudsters attempt to collect your personal data, pretending to be calling on behalf of your bank or credit card company.

Please note that we will never ask you for any confidential data like credit card CVV, PIN, login credentials, password, One Time Password (OTP), etc.

If you have any suspicions about any such request being made to you, please call up the helpline to confirm the request.
You can call the SBI Card helpline at:

39 02 02 02 (prefix local STD code) or 1860 180 1290

Contact us if you suspect any fraudulent activity or transaction in your account, please call our SBI Card helpline.
You can also report such incidents at feedback@sbicard.com.

Phishing

What is Phishing?
Phishing is an act of attempting to acquire information such as user names, passwords, and credit card details by disguised entities with malicious intent. It can be in the form of an email, SMS, website screen or pop-up that appears to be from your bank or card issuer. Please note that we will never ask for any confidential data like login credentials, password, One Time Password (OTP), CVV or PIN.

Follow these simple steps to protect yourself:

Do not disclose your CVV, One Time Password (OTP), online account ID and password or any other sensitive information to anyone, including SBI Card representatives.
Do not open attachments in emails coming from strange or unknown sources, as they may contain virus or Trojan, which transmit keyed-in details to phishers.
Type the web address in the browser whenever you intend to visit the SBI Card online account. Do not use links provided in emails sent from unknown resources.
Change all your passwords frequently and from your personal computer.
Avoid the use of cyber caf├ęs and public kiosks for online transactions or for accessing your SBI Card online account.
Prefer the use of virtual keyboard for logging into your SBI Card online account.
Log out from your account and then close the browser window, after completing your transaction.
Check the last log in date and time details in your online account everytime you log in.
Register your email and mobile number with SBI Card so that you can get regular alerts about your account.
Check your SBI Card statements properly for any suspicious transactions. If you ever notice any unauthorised transactions, immediately report the same to SBI Card helpline.
Install effective antivirus, anti-spyware and personal firewall on your computer and mobile phone and update them regularly.
Check the site you want to transact on for secure symbols like https:// or the padlock icon.
How to report a Phishing attempt?
If you ever get an email, which you suspect has been sent with intent of phishing, please forward the original email to us at feedback@sbicard.com


Skimming

What is Skimming?
Skimming is the act of illegally copying data from the magnetic stripe of a credit, debit or ATM card.

The card number and/or details are procured using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device called skimmer to swipe and store hundreds of such credit card numbers. Skimming can be done at restaurants, bars, gas stations and retail counters where the physical use of card is done.

How to prevent your card from getting skimmed:


Review your credit card statements properly and regularly. If you ever observe a disputed or suspicious transaction, report the same to our helpline immediately
Remember to collect your card after transaction.
Do not handover your SBI Card to anyone including company representatives
Cover your keypad while you are typing in your PIN number. Use your hand and body to cover your keypad when operating a handheld pin-pad or a payment processing machine like an ATM. This will prevent shoulder surfers and pinhole cameras from observing your PIN number
Always ensure that your card is swiped in your presence. Pay at the terminal instead of giving your card to a waiter for payment processing, after dining at restaurants.