New method to predict solar storms developed

Agencies
December 9, 2018

Kolkata, Dec 9: A team of scientists have found a way to predict the Sun's activity over the coming decades, which could help better prepare against solar storms that may cripple satellite communications and Earth's electric power grids.

In a study published in the journal Nature Communications, the team also showed that there is little possibility of a Sun-induced climate cooling in the coming year.

Researchers from Indian Institute of Science Education and Research (IISER) Kolkata and Inter-University Centre for Astronomy and Astrophysics (IUCAA) Pune put forward a prediction for the upcoming sunspot cycle which reveals the expected conditions in space over the next decade. 

"This research has direct relevance for protection of India's space-based technological assets and the global climate," said Sourav Pal, Director of IISER Kolkata.

Using a novel technique devised by Professor Dibyendu Nandi from IISER Kolkata and his PhD student Prantika Bhowmik, the team predicts that the next sunspot cycle will start about a year after the end of the current cycle and peak in 2024.

They also predict that space environmental conditions over the next decade would be similar or slightly harsher compared to the last decade. 

"The space weather is governed by a constant stream of charged particles -- electrons and protons -- flowing out from the Sun and permeating the solar system," said Nandi, who is also a research associate at IUCAA.

Occasionally, the Sun releases spurts of charged winds that travel towards the Earth at astonishing speeds, he said.

These result in space storms that can cripple satellites, trip electric power grids and lead to large-scale telecommunication breakdowns.

"It has been known for some time that the cycle of sunspots control all these aspects of solar activity and determines its influence on our space environment and climate," said Bhowmik. 

Astrophysicists have been attempting for decades to devise methods to predict the future occurrence of sunspots.

Sunspots can measure up to ten times the size of Earth, with magnetic fields ten thousand times stronger.

These spots have been observed through telescopes since the times of Galileo. 

According to the researchers, the current sunspot cycle dubbed as solar cycle 24 is just ending and it has been one of the weakest cycles in a century.

In fact, over the last several decades, successive sunspot cycles have significantly weakened in strength.

This association has led to scientists to speculate a significantly weak sunspot cycle 25 or an impending disappearance of sunspots for many decades would alleviate global warming and bring down the Earth's temperature.

The research, which was supported by the Indian Ministry of Human Resource Development as well as NASA, found no evidence of an impending disappearance of sunspot cycles.

The team concluded that speculations of an imminent Sun induced cooling of global climate is very unlikely.

"The behaviour of the magnetic field, and the particles emitted from the Sun has a profound effect on the Earth's climate and living conditions of the Earth's inhabitants, as well as various other activities that involve long-range communication and satellite technology," said Somak Raychaudhury, Director of IUCAA.

"Bhowmik and Nandy's models show considerable predictive power, and it looks like we will now be able to predict the fluctuations of solar activity much more reliably," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 9,2020

Soon, you may be able to withdraw cash from an ATM without touching any part of the machine. AGS Transact Technologies, a provider of cash and digital payment solutions and automation technology, on Monday said it has successfully developed and tested a touchless ATM solution in light of the COVID-19 pandemic.

The ‘contactless' solution, currently under demo at interested banks, enables a customer to perform all the steps required to withdraw cash from an ATM using the mobile app itself. 

The customer simply has to scan the QR code displayed on the ATM screen and follow the directions on their respective bank's mobile application. 

This includes entering the amount and mPIN required to dispense the cash from the ATM machine. 

According to the company, the QR code feature makes cash withdrawals quicker and more secure, and negates the chances of compromising the ATM Pin or card skimming.

"The new Touchless ATM solution is an extension of the flagship QR Cash solution which ensures safety of the users and will provide a seamless cash withdrawal experience with enhanced security," said Ravi B. Goyal, Chairman and MD, AGS Transact Technologies Ltd.

With minimum investment, the banks can enable this solution for their ATM networks by upgrading the existing software.

AGSTTL has so far installed, maintained and managed a network of over 72,000 ATMs across the country and also provides customised solutions to leading banks. 

The company earlier introduced UPI-QR based Cash withdrawal solution in partnership with Bank of India. 

This is how the solution works.

Open the Bank mobile application on your smartphone and select QR Cash Withdrawal. Enter the amount you wish to withdraw on the mobile app and scan the QR code on the ATM screen.

Next, confirm the amount by clicking on ‘proceed' in the app and enter the mPin to authenticate the transaction. Now collect the cash and receipt and you are done.

"The seamless, cardless and touchless withdrawal method is designed to provide easy transaction flow, without the need to touch the ATM screen or enter the pin," said Mahesh Patel, President and Group Chief Technology Officer, AGS Transact Technologies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.