Mukesh Ambani tops India's 100 richest billionaires, Mallya drops out

September 26, 2014

Singapore, Sep 26: For the first time, the 100 richest tycoons in India are all billionaires with Mukesh Ambani topping the league for the eighth consecutive year, according to Forbes.

Mallya dropsWith a net worth of USD 23.6 billion, up USD 2.6 billion from last year, RIL Chief Mukesh Ambani topped the list for the eighth consecutive year.

Ambani was followed by Dilip Shanghvi, who got richer this year by USD 4.1 billion. Shanghvi is the new No. 2, after he displaced steel baron Lakshmi Mittal (USD 15.8 billion), who slipped to the fifth place.

Wipro's Azim Premji moved up one notch to the number three position as his net wealth increased to USD 16.4 billion from USD 13.8 billion previously. Pallonji Mistry, patriarch of construction giant Shapoorji Pallonji Group which is the biggest shareholder in Tata Sons with a new worth of USD 15.9 billion, was placed in the fourth place.

Forbes said that "good days are here" for the India's 100 Richest, as the top 100 richest Indians are all billionaires with combined wealth of USD 346 billion, up more than a third from USD 259 billion in 2013.

Propelled by the euphoria after the Bharatiya Janata Party's landslide victory in May, the stock market has gained 28 per cent since January, driving the net-worth of the uber-rich people in India.

The biggest dollar gainer is ports magnate Gautam Adani, who jumped 11 spots to 11th rank in the list, adding nearly USD 4.5 billion to his wealth which reached USD 7.1 billion on soaring share prices.

"Shares of Adani's companies started soaring ahead of the elections on hopes of a BJP victory. The gains added close to USD 4.5 billion to his wealth, more than anyone else," Forbes said.

Others in the top 10 include NRI businessmen Hinduja Brothers who were at the sixth position with a net worth of USD 13.3 billion, followed by Shiv Nadar (7th, USD 12.5 billion), Godrej family (8th, USD 11.6 billion), Kumar Birla (9th, USD 9.2 billion) and Sunil Mittal & family (10th, USD 7.8 billion).

As many as 85 of the 89 who returned to the top 100 from last year are wealthier, and several are billionaires for the first time.

Among them are Qimat Rai Gupta (ranked 48, net worth USD 1.95 billion), Chairman of Havells; V G Siddhartha (75, USD 1.27 billion), founder of the Cafe Coffee Day chain; and brothers Harsh Goenka (82, USD 1.18 billion) and Sanjiv Goenka (69, USD 1.4 billion), who run their independent empires and are listed separately.

UB Group Chairman Vijay Mallya is no longer a member of India's 100 Richest club, even as fortunes of the country's uber-rich have seen a significant growth since last year.

Mallya, who has been declared as 'wilful defaulter' by lenders following huge debts on his Kingfisher Airlines, is missing from the Forbes latest list of 100 richest released today. He was ranked at 84th position in 2013, with a net worth of USD 800 million.

With a record USD 1 billion as the minimum net worth this year, as many as 11 persons dropped out of this year's list including Mallya.

"The flamboyant Vijay Mallya, who was tagged by his bankers as a "willful defaulter," also dropped off," Forbes said.

The drop-offs this year also include, Brij Bhushan Singal, whose Bhushan Steel's shares tanked after son Neeraj was arrested in a corruption scandal, Forbes said.

In sharp contrast, the combined net worth of India's 100 wealthiest is USD 346 billion, up from more than a third from USD 259 billion in 2013, thanks to soaring stock markets which have gained 28 per cent since January this year.

Earlier in March 2013, Mallya was dropped from Forbes global rich list, while he had moved out of the billionaire league way back in 2012.

Amid huge debt burden and mounting losses at Kingfisher Airlines, Mallya's fortunes has been declining continuously over the recent years.

The airline owes Rs 7,600 crore to 17 banks. In February 2012, the banks had formally declared loan recall on KFA and began recovery process. They have recovered around Rs 2,000 crore by selling pledged shares.

Already, United Bank of India has won a legal backing on its decision to declare Mallya and other top executives of the airline as "wilful defaulters". India's largest bank SBI has also sent a notice to tag them as "wilful defaulters".

State-run PNB and IDBI Bank, and private lenders Federal Bank and Axis Bank are also in the process of doing the same.

Burdened with huge losses and large debts, Kingfisher Airlines stopped flying in October 2012 and its flying licence also lapsed about two months later.

About Mallya Forbes India in October 2012 had said that the 'king of good times' is having nothing but bad times lately.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 9,2020

Soon, you may be able to withdraw cash from an ATM without touching any part of the machine. AGS Transact Technologies, a provider of cash and digital payment solutions and automation technology, on Monday said it has successfully developed and tested a touchless ATM solution in light of the COVID-19 pandemic.

The ‘contactless' solution, currently under demo at interested banks, enables a customer to perform all the steps required to withdraw cash from an ATM using the mobile app itself. 

The customer simply has to scan the QR code displayed on the ATM screen and follow the directions on their respective bank's mobile application. 

This includes entering the amount and mPIN required to dispense the cash from the ATM machine. 

According to the company, the QR code feature makes cash withdrawals quicker and more secure, and negates the chances of compromising the ATM Pin or card skimming.

"The new Touchless ATM solution is an extension of the flagship QR Cash solution which ensures safety of the users and will provide a seamless cash withdrawal experience with enhanced security," said Ravi B. Goyal, Chairman and MD, AGS Transact Technologies Ltd.

With minimum investment, the banks can enable this solution for their ATM networks by upgrading the existing software.

AGSTTL has so far installed, maintained and managed a network of over 72,000 ATMs across the country and also provides customised solutions to leading banks. 

The company earlier introduced UPI-QR based Cash withdrawal solution in partnership with Bank of India. 

This is how the solution works.

Open the Bank mobile application on your smartphone and select QR Cash Withdrawal. Enter the amount you wish to withdraw on the mobile app and scan the QR code on the ATM screen.

Next, confirm the amount by clicking on ‘proceed' in the app and enter the mPin to authenticate the transaction. Now collect the cash and receipt and you are done.

"The seamless, cardless and touchless withdrawal method is designed to provide easy transaction flow, without the need to touch the ATM screen or enter the pin," said Mahesh Patel, President and Group Chief Technology Officer, AGS Transact Technologies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.