Author: admin

  • UPI payment apps may soon impose transaction limit: Check Details

    zeenews.india.com understands that your privacy is important to you and we are committed for being transparent about the technologies we use.  This cookie policy explains how and why cookies and other similar technologies may be stored on and accessed from your device when you use or visit zeenews.india.com websites that posts a link to this Policy (collectively, “the sites”). This cookie policy should be read together with our Privacy Policy.

    By continuing to browse or use our sites, you agree that we can store and access cookies and other tracking technologies as described in this policy.

    What are Cookies and Other Tracking Technologies?

    A cookie is a small text file that can be stored on and accessed from your device when you visit one of our sites, to the extent you agree.  The other tracking technologies work similarly to cookies and place small data files on your devices or monitor your website activity to enable us to collect information about how you use our sites. This allows our sites to recognize your device from those of other users on our sites. The information provided below about cookies also applies to these other tracking technologies.


    How do our sites use Cookies and Other Tracking Technologies?

    Zeenews.com use cookies and other technologies to store information in your web browser or on your mobile phone, tablet, computer, or other devices (collectively “devices”) that allow us to store and receive certain pieces of information whenever you use or interact with our zeenews.india.com applications and sites. Such cookies and other technologies helps us to identify you and your interests, to remember your preferences and to track use of zeenews.india.com We also use cookies and other tracking technologies to control access to certain content on our sites, protect the sites, and to process any requests that you make to us.
    We also use cookies to administer our sites and for research purposes, zeenews.india.com also has contracted with third-party service providers to track and analyse statistical usage and volume information from our site users. These third-party service providers use persistent Cookies to help us improve user experience, manage our site content, and analyse how users navigate and utilize the sites.

    First and Third-party Cookies

    First party cookies

    These are those cookies that belong to us and which we place on your device or are those set by a website that is being visited by the user at the time (e.g., cookies placed by zeenews.india.com)

    Third-party cookies

    Some features used on this website may involve a cookie being sent to your computer by a third party. For example, if you view or listen to any embedded audio or video content you may be sent cookies from the site where the embedded content is hosted. Likewise, if you share any content on this website through social networks (for example by clicking a Facebook “like” button or a “Tweet” button) you may be sent cookies from these websites. We do not control the setting of these cookies so please check the websites of these third parties for more information about their cookies and how to manage them.

    Persistent Cookies
    We use persistent cookies to improve your experience of using the sites. This includes recording your acceptance of our cookie policy to remove the cookie message which first appears when you visit our site.
    Session Cookies 
    Session cookies are temporary and deleted from your machine when your web browser closes. We use session cookies to help us track internet usage as described above.
    You may refuse to accept browser Cookies by activating the appropriate setting on your browser. However, if you select this setting you may be unable to access certain parts of the sites. Unless you have adjusted your browser setting so that it will refuse cookies, our system will check if cookies can be captured when you direct your browser to our sites.
    The data collected by the sites and/or through Cookies that may be placed on your computer will not be kept for longer than is necessary to fulfil the purposes mentioned above. In any event, such information will be kept in our database until we get explicit consent from you to remove all the stored cookies.

    We categorize cookies as follows:

    Essential Cookies

    These cookie are essential to our site in order to enable you to move around it and to use its features. Without these essential cookies we may not be able to provide certain services or features and our site will not perform as smoothly for you as we would like. These cookies, for example, let us recognize that you have created an account and have logged in/out to access site content. They also include Cookies that enable us to remember your previous actions within the same browsing session and secure our sites.

    Analytical/Performance Cookies

    These cookies are used by us or by our third-party service providers to analyse how the sites are used and how they are performing. For example, these cookies track what content are most frequently visited, your viewing history and from what locations our visitors come from. If you subscribe to a newsletter or otherwise register with the Sites, these cookies may be correlated to you.

    Functionality Cookies

    These cookies let us operate the sites in accordance with the choices you make. These cookies permit us to “remember you” in-between visits. For instance, we will recognize your user name and remember how you customized the sites and services, for example by adjusting text size, fonts, languages and other parts of web pages that are alterable, and provide you with the same customizations during future visits.

    Advertising Cookies

    These cookies collect information about your activities on our sites as well as other sites to provide you targeted advertising. We may also allow our third-party service providers to use cookies on the sites for the same purposes identified above, including collecting information about your online activities over time and across different websites. The third-party service providers that generate these cookies, such as, social media platforms, have their own privacy policies, and may use their cookies to target advertisement to you on other websites, based on your visit to our sites.

    How do I refuse or withdraw my consent to the use of Cookies?

    If you do not want cookies to be dropped on your device, you can adjust the setting of your Internet browser to reject the setting of all or some cookies and to alert you when a cookie is placed on your device. For further information about how to do so, please refer to your browser ‘help’ / ‘tool’ or ‘edit’ section for cookie settings w.r.t your browser that may be Google Chrome, Safari, Mozilla Firefox etc.
    Please note that if your browser setting is already setup to block all cookies (including strictly necessary Cookies) you may not be able to access or use all or parts or functionalities of our sites.
    If you want to remove previously-stored cookies, you can manually delete the cookies at any time from your browser settings. However, this will not prevent the sites from placing further cookies on your device unless and until you adjust your Internet browser setting as described above.
    For more information on the development of user-profiles and the use of targeting/advertising Cookies, please see www.youronlinechoices.eu if you are located in Europe or www.aboutads.info/choices if in the United States.

    Contact us

    If you have any other questions about our Cookie Policy, please contact us at:
    If you require any information or clarification regarding the use of your personal information or this privacy policy or grievances with respect to use of your personal information, please email us at response@zeemedia.esselgroup.com.

  • India clocks 129 deals at $2.1 bn in Oct; 77% YoY decline in value [details]

    India clocked 129 deals valued at $2.1 billion in the month of October, a 42 per cent fall in volumes and a significant 77 per cent decline in values as compared to October last year, a report showed on Tuesday.

    When compared to September, the deal volumes witnessed an 11 per cent decline while values decreased by 49 per cent due to the absence of big-ticket transactions, according to Grant Thornton Bharat’s Dealtracker October 2022 report.

    Graph. (File Photo: IANS)Graph. (File Photo: IANS)

    The M&A (merger and acquisition) space recorded 33 deals at $692 million, witnessing a significant downtrend both in terms of deal volumes by 47 per cent and deal values by 79 per cent.

    The start-up sector led the volumes with 27 per cent of the deals driven by the enterprise application segment followed by autotech and edtech segments.

    “In view of inflation, with ongoing improvement in domestic economic activity supported by private consumption growth and expected support from festive season demand, Indian domestic demand showed a relatively healthy growth trend,” said Shanthi Vijetha, Partner, Growth at Grant Thornton Bharat.

    Startup

    IANS

    Owing to this, macroeconomic strength continues to manifest in the form of improving high-frequency consumption and industrial indicators.

    “Considering this, we expect domestic deal activity to continue, if not grow, in the coming months,” Vijetha added.

    Private equity investments recorded $1,448 million across 96 deals. The PE investment trend witnessed a drop, both in terms of deal values and volumes, over October 2021, said the report.

    The year to date (YTD) 2022 recorded 23 initial public offerings (IPO) with an issue size of $8.8 billion, compared to 43 IPO issues raising $23.5 billion in YTD 2021.

    (With inputs from IANS)

  • Hackers create fake websites, steal data around ‘Black Friday’ sales

    Threat actors are hosting websites for malicious campaigns centred around the Black Friday theme and e-commerce, cryptocurrency and travel are the top targets, a new report has revealed.

    Researchers found cybercrime forums across various languages are rife with chatter about Black Friday.

    While some actors are promoting their malicious services/campaigns, others are looking to avail them, according to CloudSEK researchers who also discovered an Ethereum giveaway scam website.

    “Compromised personal identifiable information (PII) and banking credentials can be used to perform unauthorised transactions and social engineering attacks,” they warned.

    Hacker

    HackerIANS

    CloudSEK’s contextual AI digital risk platform ‘XVigil’ discovered hundreds of Black Friday-themed domains registered and operational.

    Common forms of attacks included the impersonation of legitimate websites, services for Google/Facebook ads, and the spread of malicious applications.

    “Various elements come into play here, right from hosting a website to gaining critical information of victims by using different techniques. Threat actors are constantly looking for opportunities to siphon crucial data or money,” said Rishika Desai, Cyber Threat Researcher, CloudSEK.

    Black Friday' sales

    ‘Black Friday’ salesIBT Media

    The finding showed that website cloning is a common technique used by hackers of all levels of sophistication to host fake instances of legitimate websites.

    “The iconic Black Friday sale has become a global theme now where cybercriminals at every level and expertise try their best to launch malicious campaigns. Most of these campaigns misuse or impersonate popular brands and companies providing sales and services to cheat the public,” Desai added.

    The researchers advised to be aware of the freebies, attractive deals and seemingly suspicious third-party solutions.

    (With inputs from IANS)

  • Government unveils framework to prevent fake reviews of products

    Aiming to guard customers against fake online reviews of products, the government on Monday issued a comprehensive set of guidelines that would come into effect from November 25 and would be voluntary in nature.

    The guidelines titled “Indian Standard (IS) 19000:2022 Online Consumer Reviews – Principles and Requirements for their Collection, Moderation and Publication”, will be applicable to every online platform which publishes consumer reviews.

    These have been finalised by the Bureau of Indian Standards (BIS) and came into being after the Department of Consumer Affairs received a slew of complaints about fake reviews of products being posted by several e-commerce companies on the social media and on web portals.

    online shopping

    BIS will also develop a conformity assessment scheme for the standard within 15 days to assess compliance.

    Secretary, Consumer Affairs, Rohit Kumar Singh told media persons that to begin with, all stakeholders would have to ensure self-regulation.

    However, if it is found that fake reviews are still being circulated, then complaints can be made to the various consumer fora and tribunals, he said.

    Major crackdown on fake product reviews

    Regarding penalising erring entities indulging in fake reviews, the Secretary said that the decision regarding that would be taken by the consumer fora and tribunals, to whom the complaints would be referred.

    He also said that 11 major e-retailers like Zomato, Swiggy, Tata Sons, Reliance Retail, Meta, and Amazon among others took part in the consultations for preparing the guidelines. They were also part of the committee along with the BIS, which formulated the guidelines.

    The guidelines prescribe specific responsibilities for the review author and the review administrator. For review authors, these include confirming acceptance of terms and conditions, providing contact information and for review administrator, these include safeguarding personal information and training of staff.

    E-commerce

    [Representational image]Creative Commons

    Violation of the standards by any entity may be considered as an unfair trade practice or violation of consumer rights and a consumer may submit such grievances to the National Consumer Helpline, Consumer Fora or the CCPA.

    The standard provides for responsibilities of organization including developing a code of practice, and necessary stipulations for terms and conditions like accessibility, criteria, and ensuring content does not contain financial information etc.

    The standard also provides for methods for ‘Verification of Review Author’ through email address, identification by telephone call or SMS, confirming registration by clicking on a link, using captcha system etc. to check traceability and genuineness of the review author.

    With respect to moderation, the standard provides for both automated and manual moderation and provides checks for analysing the review content. As regards to publication, the standard includes considerations for the review administrator at the time of publication process and after the publication process. The accuracy of the review, default display and weightage of ratings are defined in the publication process.

    The guidelines have been prepared by the Bureau of Indian Standards (BIS) on the basis of the report by a committee, which was formed in June this year.

    The committee consisted of stakeholders like Advertising Standards Council of India (ASCI), Confederation of Indian Industry (CII) and the Department of Consumer Affairs.

    (With inputs from IANS)

  • AIIMS ransomware attack: Key patient data at risk of leak, sale on Dark Web

    With the All India Institute of Medical Sciences (AIIMS), New Delhi, still struggling to get its servers up and running after a massive ransomware attack earlier this week, cyber-security researchers on Saturday said the most reported attacks in the healthcare industry, which rose during the pandemic, involve the leak or sale of databases on the Dark Web.

    The exploited databases contain Personally Identifiable Information (PII) of patients and healthcare workers, as well as administrative information such as blood donor records, ambulance records, vaccination records, caregiver records, login credentials, etc.

    “Government agencies involved in the healthcare industry should abide by HIPAA’s (Health Insurance Portability and Accountability Act) compliance requirements, create awareness among users regarding cyber-attacks, online scams, and phishing campaigns, set up policies for secure passwords and enable multi-factor authentication (MFA),” a spokesperson of AI-driven cyber-security firm CloudSEK told IANS.

    AIIMS Delhi

    AIIMS

    The cyber attack on AIIMS shut down its main and back-up servers.

    The attackers hacked the e-hospital service which manages the patient data system, affecting the outpatient department (OPD) and sample collection services.

    Those behind the cyber attack have warned AIIMS to “prepare for a negotiation”.

    Delhi Police are investigating the cyber attack.

    Meanwhile, AIIMS officials said that all affected online patient services are now being run on manual mode.

    According to CloudSEK, a massive spike in cyberattacks on healthcare organisations has been witnessed during the pandemic.

    ransomware cyberattack

    ransomware cyberattackReuters

    “Our research shows that in the first four months of 2022, the number of cyberattacks on the industry rose by 95.34 per cent compared to the same period in 2021. The Indian healthcare sector was the second most targeted when it comes to cyberattacks worldwide,” the company spokesperson said.

    Protecting patients’ medical and financial information has emerged as a new challenge for healthcare organisations.

    According to Indusface, an application security SaaS company, there were more than 1 million cyber attacks of various types across Indusface’s global healthcare clientele.

    Of these, 278,000 attacks were reported in India, highlighting the vulnerabilities of the Indian healthcare sector.

    CloudSEK research revealed recently that immediate challenges to the healthcare sector include phishing and BEC (business email compromise), ransomware attacks, DDoS (Distributed Denial of Service) attacks, insider threats, critical infrastructure and Medjacking’, etc.

    In August this year, the UK’s National Health Service (NHS) was hit by a ransomware attack via a third-party vendor.

    Advanced, which provides several products to NHS hospitals and clinics, said its systems were disrupted by a ransomware attack on August 4.

    FPIs sold healthcare and IT stocks in March

    healthcare

    Three months after the major attack wiped out NHS systems, patients’ records are still missing and safety has been compromised, according to reports.

    The August attack has been the most disruptive cyber-security incident on the health service since WannaCry ransomware attack in May 2017, which disrupted 80 NHS trusts and 603 NHS organisations, including 595 GP practices.

    “Organisations should frequently update and patch networks, systems, and software. Keep several backups, both online and offline, in different and secure places. Keep an eye on logs for any unexpected traffic and activity on websites and other applications,” advised CloudSEK.

    Healthcare experts, including hospital staff, should avoid clicking on suspicious emails, messages and links, it said.

    (With inputs from IANS)

  • Tata Consumer to acquire Bisleri for around Rs 7,000 crore: Report

    Ramesh Chauhan is divesting Bisleri International to Tata Consumer Products Ltd (TCPL) for an estimated Rs 6,000-7,000 crore, The Economic Times reported.

    The current management will continue for two years as part of the deal. Chauhan, 82, has been in indifferent health in recent times and says he doesn’t have a successor to take Bisleri to the next level of expansion. Daughter Jayanti isn’t too keen on the business, Chauhan said. Bisleri is India’s largest packaged water company.

    Tata ConsumerIANS

    The Tata Group “will nurture and take care of it even better,” although selling Bisleri was still a “painful” decision, Chauhan said.

    “I like the Tata culture of values and integrity and hence made up my mind despite the aggression shown by other interested buyers”, the report said.

    Bisleri water bottles

    Bisleri water bottles.Creative Commons/Madhawie Bansidhar

    Bisleri is said to have had several suitors at different times, including Reliance Retail, Nestle and Danone. Talks with Tata have been going on for two years and he made up his mind after meeting Tata Sons chairman N Chandrasekaran and Tata Consumer CEO Sunil D’Souza a few months back. “I like them. They are good guys,” he told ET.

    Chauhan doesn’t see any point in holding minority stakes after selling the business. “What will I do with it when I am not running the show?” he said.

    (With inputs from IANS)

  • WhatsApp phone numbers of about 500 mn users leaked: Report

    WhatsApp phone numbers of 487 million users have been stolen and put on sale on a “well-known” hacking community forum, the media reported.

    According to Cybernews, the dataset allegedly contains WhatsApp user data from 84 countries and phone numbers of over 32 million users from the US, 11 million from the UK, and 10 million from Russia.

    The hacker claims to have a significant number of phone numbers belonging to the citizens of Egypt (45 million), Italy (35 million), Saudi Arabia (29 million), France (20 million), and Turkey (20 million).

    WhatsApp. (File Photo: IANS)

    WhatsApp. (File Photo: IANS)IANS

    The hacker was selling the US dataset for $7,000, the UK for $2,500, and Germany for $2,000, according to the report.

    Cybernews researchers were able to get in touch with the hacker and also able to collect a sample of the data in which they found out that the shared sample contained 1,097 UK and 817 US user numbers.

    Upon investigation, the researchers found that all of them were active WhatsApp users.

    WhatsApp

    WhatsAppCreative Commons

    However, the hacker did not specify how they obtained the data, suggesting they “used their strategy,” and that all the numbers belong to WhatsApp users, said the report.

    This database can be used by hackers for spamming, phishing attempts, identity theft, and other cybercriminal activities.

    WhatsApp provides numerous privacy settings, such as hiding status and profile pictures, that users can enable to protect themselves from prying eyes.

    (With inputs from IANS)

  • Costly eatables sold at multiplexes, posh restaurants contain operational charges: Govt

    Stepping into a swanky multiplex or a high-end restaurant or an airport lounge and purchasing eatables can cost you a bomb.

    The Department of Consumer Affairs frequently receives complaints of overcharging, when people complain that they have been charged more than the maximum retail price (MRP) mentioned on a product.

    The Bombay Stock Exchange (BSE) has sought explanation from PVR to a media report of stake buy by Chinese conglomerate Wanda Group. In Picture: Cinema-goers watch a movie trailer at a PVR Multiplex in Mumbai November 10, 2013 (representational image).Reuters file

    However, if you feel that you have been cheated of your hard-earned money into paying a premium for a burger or a bucket of popcorn in a multiplex or at a posh hotel, there is little that any governmental authority can do, as this is something called paying for an ‘ambience’, which basically refers to operational costs, said government sources.

    Not overcharged?

    Since this cost is inbuilt in the displayed price of the item, it cannot be termed as overcharging, sources pointed out.

    In such cases, there is hardly anything that the authorities can do, as additional tax is charged on a simple snack as part of the ambience cost, industry watchers said. In these cases, action is warranted, sources within the department said.

    However, if it comes to paying an extraordinarily high amount for snacks at a multiplex or a high-end restaurant, that is something which is charged by the service provider for the ambience which is being made available to the customer and the cost for providing it.

    Terminal 2 of Bengaluru International Airport

    PM Modi inaugurates terminal 2 of Bengaluru International airportIANS

    “This is inbuilt in the MRP for that particular product, therefore, it is something which is expected in such places. We can only intervene if in case of an over the counter payment, the amount being charged is more than the MRP mentioned on the product (in other words overcharging),” sources in the Consumer Affairs Department said.

    This is evident from the fact that in the past, the government had taken serious note of complaints of bottled water or packaged food items and drinks being sold at prices higher than the MRP.

    The Consumer Affairs Department had earlier said that it keeps receiving complaints of products being sold at a price higher than the MRP.

    There are provisions to prevent charging above the MRP in the Legal Metrology Act 2009, sources said, adding that penalties are imposed on violation of the Act’s provisions by the concerned authorities.

    (With inputs from IANS)

  • Musk reveals Twitter 2.0; says top software aces joining company [details]

    Elon Musk on Sunday revealed his Twitter 2.0 — The Everything App, saying that the new user signups are at an all-time high and the company is now actively recruiting.

    Musk, who sacked more than half of Twitter’s workforce, said that “world-class software aces are joining Twitter”.

    Sharing some company slides he shared with Twitter employees, the world’s richest man said the next-gen Twitter will focus on advertising as entertainment and video.

    elon musk

    “We’re recruiting. User active minutes are at an all time high and monetizable daily active users (mDAUs) have crossed a quarter-billion mark,” Musk informed.

    “Hate speech impressions are lower, reported impersonation spiked and then fall,” he added.

    After relaunching Twitter ‘Verified’ with Blue badge for $8, Musk will now bring encrypted direct messages (DMs) and long-form tweets on the platform.

    He said that the goal is a “trusted digital town square, where a wide range of views are tolerated, provided people don’t break the law or spam”.

    Elon Musk

    Elon MuskIANS

    “For example, any incitement to violence will result in account suspension,” he stressed.

    Musk earlier said that he had reinstated former US President Donald Trump back on the platform, as Trump did not violate any law and the micro-blogging “platform must be fair to all”.

    Based on a poll, Twitter CEO on November 20 had announced that former US President Trump was allowed to rejoin the micro-blogging platform.

    (With inputs from IANS)

  • 5.4 mn users’ data exposed online as Musk reveals Twitter 2.0; includes phone numbers, email IDs

    As Elon Musk goes gaga over Twitter 2.0 which will be the ‘Everything App’, at least 5.4 million Twitter user records, stolen via an internal bug, have been leaked online on a hacker forum.

    In addition to the 5.4 million records for sale online, there were an additional 1.4 million Twitter profiles collected using a different Twitter application programming interface (API) that have reportedly been shared privately among a few people.

    The massive data consists of scraped public information as well as private phone numbers and email addresses that are not meant to be public, reports Bleeping Computer.

    Twitter

    A 3D-printed Twitter logo is seen through broken glass, in this picture illustration taken February 8, 2016.REUTERS/Dado Ruvic/Illustration/File Photo

    Twitter 2.0

    The data expose came at a time as Musk revealed his Twitter 2.0 – The Everything App, saying that the new user signups are at an all-time high and the company is now actively recruiting.

    Security expert Chad Loder first broke the news on Twitter and was suspended soon from the platform.

    “I have just received evidence of a massive Twitter data breach affecting millions of Twitter accounts in the EU and the US. I have contacted a sample of the affected accounts and they confirmed that the breached data is accurate. This breach occurred no earlier than 2021,” Loder had posted on Twitter.

    Elon Musk on Joe Rogan experience

    Elon Musk on Joe Rogan experienceYouTube

    The data containing non-public information was stolen using a Twitter API vulnerability fix in January this year.

    This data was collected in December 2021 using a Twitter API vulnerability disclosed in the HackerOne bug bounty programme, the report said on Sunday.

    Most of the data consisted of public information, such as Twitter IDs, names, login names, locations, and verified status.

    It also included private information, such as phone numbers and email addresses.

    Musk or Twitter were yet to comment on the report.

    Pompompurin, the owner of the Breached hacking forum, told BleepingComputer that “they were responsible for exploiting the bug and creating the massive dump of Twitter user records after another threat actor known as ‘Devil’ shared the vulnerability with them,” the report mentioned.

    As hackers released 5.4 million records online, an even larger data dump has allegedly been created using the same vulnerability, according to the report.

    “We were told that it consists of over 17 million records but could not independently confirm this,” said the report.

    (With inputs from IANS)