This year to last a second longer!

December 30, 2016

Washington, Dec 30: This year will last a second longer as a "leap second" will be added to the world's clocks on New Year's Eve by the timekeepers.

clockThe extra second will be inserted at the US Naval Observatory's Master Clock Facility in Washington, DC at 23 hours, 59 minutes and 59 seconds Coordinated Universal Time (UTC) which corresponds to 5:29:59 am Indian Standard Time on January 1.

Historically, time was based on the mean rotation of the Earth relative to celestial bodies and the second was defined in this reference frame.

However, the invention of atomic clocks defined a much more precise "atomic" timescale and a second that is independent of Earth's rotation.

In 1970, international agreements established a procedure to maintain a relationship between Coordinated Universal Time (UTC) and UT1, a measure of the Earth's rotation angle in space.

The International Earth Rotation and Reference Systems Service (IERS) is the organisation which monitors the difference in the two time scales and calls for leap seconds to be inserted in or removed from UTC when necessary to keep them within 0.9 seconds of each other.

In order to create UTC, a secondary timescale, International Atomic Time (TAI), is first generated; it consists of UTC without leap seconds.

When the system was instituted in 1972, the difference between TAI and UTC was determined to be 10 seconds.

Since 1972, 26 additional leap seconds have been added at intervals varying from six months to seven years, with the most recent being inserted on June 30, 2015.

After the insertion of the leap second in December, the cumulative difference between UTC and TAI will be 37 seconds.

Confusion sometimes arises over the misconception that the occasional insertion of leap seconds every few years indicates that the Earth should stop rotating within a few millennia.

This is because some mistake leap seconds to be a measure of the rate at which the Earth is slowing.

The one-second increments are, however, indications of the accumulated difference in time between the two systems.

The decision as to when to add a leap second is determined by the IERS, for which the USNO serves as the Rapid Service/Prediction Center.

Measurements show that the Earth, on average, runs slow compared to atomic time, at about 1.5 to 2 milliseconds per day.

These data are generated by the USNO using the technique of Very Long Baseline Interferometry (VLBI).

VLBI measures the rotation of the Earth by observing the apparent positions of distant objects near the edge of the observable universe.

These observations show that after roughly 500 to 750 days, the difference between Earth rotation time and atomic time would be about one second.

Instead of allowing this to happen a leap second is inserted to bring the two time-scales closer together.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 12,2020

New Delhi, Jun 12: The Supreme Court on Friday asked Solicitor General Tushar Mehta to convene a meeting of the Finance Ministry and RBI officials over the weekend to decide whether interest incurred on EMIs during the moratorium period can be charged by banks.

A bench comprising Justices Ashok Bhushan, Sanjay Kishan Kaul and M.R. Shah queried Mehta as the court was concerned since the Centre has deferred loan for three months.

"Then how can interest of these 3 months be added?" the apex bench asked. Mehta replied: "I need to sit down with the RBI officials and have a meeting."

SBI's counsel, senior advocate Mukul Rohatgi, intervened during the proceedings and said "all banks are of the view that interest cannot be waived for a six month EMI moratorium period".

"We need to discuss it with the RBI," insisted Rohatgi.

Justice Bhushan then asked Mehta to convene a meeting of the RBI and Finance Ministry officials over the weekend, and listed the matter for further hearing on June 17.

The top court, during the hearing, indicated that it was not considering a complete waiver of interest but was only concerned that postponement of interest shouldn't accrue further interest on it.

After the RBI said the waiver of interest charges on EMIs during moratorium will lead to loss of 1 per cent of the nation's GDP, the top court had earlier asked the Finance Ministry to reply, whether the interest could be waived or it would continue during the moratorium period.

The top court said these are not normal times, and it is a serious issue, as on one hand moratorium is granted and then, the interest is charged on loans during this period.

"There are two issues in this (matter). No interest during the moratorium period and no interest on interest," said Justice Bhushan. The observation from the bench came on a petition by Gajendra Sharma, in which he sought a direction to declare portion of the RBI's March 27 notification as ultra vires to the extent it charged interest on the loan amount during the moratorium period.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 9,2020

Soon, you may be able to withdraw cash from an ATM without touching any part of the machine. AGS Transact Technologies, a provider of cash and digital payment solutions and automation technology, on Monday said it has successfully developed and tested a touchless ATM solution in light of the COVID-19 pandemic.

The ‘contactless' solution, currently under demo at interested banks, enables a customer to perform all the steps required to withdraw cash from an ATM using the mobile app itself. 

The customer simply has to scan the QR code displayed on the ATM screen and follow the directions on their respective bank's mobile application. 

This includes entering the amount and mPIN required to dispense the cash from the ATM machine. 

According to the company, the QR code feature makes cash withdrawals quicker and more secure, and negates the chances of compromising the ATM Pin or card skimming.

"The new Touchless ATM solution is an extension of the flagship QR Cash solution which ensures safety of the users and will provide a seamless cash withdrawal experience with enhanced security," said Ravi B. Goyal, Chairman and MD, AGS Transact Technologies Ltd.

With minimum investment, the banks can enable this solution for their ATM networks by upgrading the existing software.

AGSTTL has so far installed, maintained and managed a network of over 72,000 ATMs across the country and also provides customised solutions to leading banks. 

The company earlier introduced UPI-QR based Cash withdrawal solution in partnership with Bank of India. 

This is how the solution works.

Open the Bank mobile application on your smartphone and select QR Cash Withdrawal. Enter the amount you wish to withdraw on the mobile app and scan the QR code on the ATM screen.

Next, confirm the amount by clicking on ‘proceed' in the app and enter the mPin to authenticate the transaction. Now collect the cash and receipt and you are done.

"The seamless, cardless and touchless withdrawal method is designed to provide easy transaction flow, without the need to touch the ATM screen or enter the pin," said Mahesh Patel, President and Group Chief Technology Officer, AGS Transact Technologies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.