3 of 10 most valued companies add Rs 98,622.89 cr in mcap; Infosys steals the show

Agencies
July 19, 2020

New Delhi, Jul 19: Three of the 10 most valued companies added a total of Rs 98,622.89 crore to their market valuation last week, led by stellar gains in IT major Infosys.

Seven companies from the coveted list witnessed a decline in their market valuation last week, but their cumulative loss of Rs 37,701.1 crore was less than the total gain made by three firms -- Reliance Industries Limited, Hindustan Unilever Limited and Infosys.

The market capitalisation of Infosys zoomed Rs 52,046.87 crore to Rs 3,85,027.58 crore. Shares of Infosys had rallied over 9 per cent on Thursday after the company posted a stronger-than-expected 12.4 per cent rise in the first quarter consolidated net profit.

Hindustan Unilever Limited added Rs 25,751.07 crore in its market valuation which stood at Rs 5,48,232.26 crore at close on Friday. Reliance Industries' m-cap jumped Rs 20,824.95 crore to Rs 12,11,682.08 crore.

In contrast, HDFC's valuation plunged Rs 13,920.21 crore to Rs 3,13,269.70 crore and that of Tata Consultancy Services (TCS) declined Rs 7,617.34 crore to Rs 8,26,031.21 crore.

The valuation of ICICI Bank tumbled Rs 4,205.71 crore to Rs 2,29,156.24 crore and that of Kotak Mahindra Bank by Rs 4,175.28 crore to Rs 2,62,864.37 crore.

Bharti Airtel's m-cap dipped Rs 4,009.83 crore to Rs 3,09,521.05 crore and HDFC Bank's by Rs 3,403.97 crore to Rs 6,03,463.97 crore.

The valuation of ITC declined by Rs 368.76 crore to Rs 2,38,469.29 crore.

In the ranking of top-10 firms, RIL was at the number one rank followed by TCS, HDFC Bank, HUL, Infosys, HDFC, Bharti Airtel, Kotak Mahindra Bank, ITC and ICICI Bank.

During the last week, the 30-share BSE index advanced 425.81 points or 1.16 per cent.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 10,2020

New Delhi, Mar 10: Crisis-hit Yes Bank on Tuesday said that it has enabled inward IMPS and NEFT services.

The move allows people to send money from other bank accounts to their Yes Bank account through IMPS (Immediate Payment Service) and NEFT (National Electronic Funds Transfer) mode.

In a tweet, the bank also said that Yes Bank customers can pay their credit card dues and loan obligations from other bank accounts.

"Inward IMPS/NEFT services have now been enabled. You can make payments towards YES BANK Credit Card dues and loan obligations from other bank accounts. Thank you for your co-operation. @RBIA @FinMinIndia," said tweet.

Last week Yes Bank was placed under moratorium and a withdrawal cap of Rs 50,000 was imposed till April 3.

The administrator of Yes Bank, Prashant Kumar and Rajnish Kumar, the Chairman of the State Bank of India are hopeful that moratorium would be lifted within a week.

As per the Reserve Bank of India (RBI) draft reconstruction scheme for the crisis-hit private lender, the SBI will take up 49 per cent in the bank by investing Rs 2,450 crore.

The new board of directors will stand constituted from the appointed date. It will comprise a CEO and MD, non-executive chairman and non-executive directors. The SBI will have nominee directors appointed on the board of the reconstructed bank.

The RBI may appoint additional directors to the board, who shall continue in office for one year, or until an alternate board is constituted by Yes Bank.

The SBI will not reduce its holding below 26 per cent before completion of three years from the date of infusion of the capital.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.