India Earned € 40 Million For Launching 15 Foreign Satellites

July 10, 2014

Foreign SatellitesChennai, Jul 10: Science and Technology Minister Jitendra Singh said on Wednesday (July 9) that India has earned around 40 million euros launching 15 foreign satellites from 2011 till date. Singh is also the Minister of Earth Sciences, Department of Atomic Energy and Department of Space.

While replying to a question in the Lok Sabha, Jitendra Singh said that the Indian Space Research Organisation (ISRO) launched 15 foreign satellites and 14 Indian satellites during fiscal years 2011-2014 and in this fiscal. The minister also said the revenue earned through launch of foreign satellites was 39.82 million euros.

According to Jitendra Singh, Department of Space has revealed the plan for space programme till 2020. The plan pictures development of advanced launch vehicle systems, thematic earth observational satellites with improved resolution, high-power, high-throughput communication satellites, microwave multi-spectral remote sensing satellites, weather and climate studies, constellation of satellites for regional navigation, development of critical technologies for human spaceflight and satellites for space science and planetary exploration purposes.

The minister also added that India has spent Rs 349.9 crore on its Mars Orbiter Mission till March 31, of the total project outlay of Rs 450 crore. The Indian space agency ISRO had launched the Mars Orbiter (Mangalyaan) on November 5, 2013.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 17,2020

Bengaluru, Jan 17: India’s latest communication satellite GSAT-30 was successfully launched from the Spaceport in French Guiana during the early hours on Friday.

In a press release, ISRO, has stated that the launch vehicle 'Ariane-5 VA-251' was blasted off from Kourou Launch Base, French Ginana at 0230 hours, carrying India’s GSA-30 and EUTELSAT KONNECT for Eutelasat, as per schedule.

The Ariane 5 upper stage in an elliptical Geosynchronous Transfer Orbit.

With a lift-off mass of 3,357 kg, GSAT-30 will provide continuity to operational services on some of the in-orbit satellites.

GSAT-30 derives its heritage from ISRO’s earlier INSAT/GSAT satellite series and will replace INSAT-4A in orbit.

“GSAT-30 has a unique configuration of providing flexible frequency segments and flexible coverage. The satellite will provide communication services to Indian mainland and islands through Ku-band and wide coverage covering Gulf countries, a large number of Asian countries and Australia through C-band," ISRO Chairman Dr K Sivan said.

Dr Sivan also said that “GSAT-30 will provide DTH Television Services, connectivity to VSATs for ATM, Stock-exchange, Television uplinking and teleport Services, Digital Satellite News Gathering (DSNG) and e-governance applications. The satellite will also be used for bulk data transfer for a host of emerging telecommunication applications.”

ISRO’s Master Control Facility (MCF) at Hassan in Karnataka took over the command and control of GSAT-30 immediately after its separation from the launch vehicle. Preliminary health checks of the satellite revealed its normal health.

In the days ahead, orbit-raising maneuvers will be performed to place the satellite in Geostationary Orbit (36,000 km above the equator) by using its onboard propulsion system.

During the final stages of its orbit raising operations, the two solar arrays and the antenna reflectors of GSAT-30 will be deployed. Following this, the satellite will be put in its final orbital configuration.

The satellite will be operational after the successful completion of all in-orbit tests.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.