Yes Bank enables inward IMPS, NEFT transactions

Agencies
March 10, 2020

New Delhi, Mar 10: Crisis-hit Yes Bank on Tuesday said that it has enabled inward IMPS and NEFT services.

The move allows people to send money from other bank accounts to their Yes Bank account through IMPS (Immediate Payment Service) and NEFT (National Electronic Funds Transfer) mode.

In a tweet, the bank also said that Yes Bank customers can pay their credit card dues and loan obligations from other bank accounts.

"Inward IMPS/NEFT services have now been enabled. You can make payments towards YES BANK Credit Card dues and loan obligations from other bank accounts. Thank you for your co-operation. @RBIA @FinMinIndia," said tweet.

Last week Yes Bank was placed under moratorium and a withdrawal cap of Rs 50,000 was imposed till April 3.

The administrator of Yes Bank, Prashant Kumar and Rajnish Kumar, the Chairman of the State Bank of India are hopeful that moratorium would be lifted within a week.

As per the Reserve Bank of India (RBI) draft reconstruction scheme for the crisis-hit private lender, the SBI will take up 49 per cent in the bank by investing Rs 2,450 crore.

The new board of directors will stand constituted from the appointed date. It will comprise a CEO and MD, non-executive chairman and non-executive directors. The SBI will have nominee directors appointed on the board of the reconstructed bank.

The RBI may appoint additional directors to the board, who shall continue in office for one year, or until an alternate board is constituted by Yes Bank.

The SBI will not reduce its holding below 26 per cent before completion of three years from the date of infusion of the capital.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 24,2020

Melbourne, Jul 24: Home-made cloth face masks may need a minimum of two layers, and preferably three, to prevent the dispersal of viral droplets associated with Covid-19, according to a study.

Researchers, including those from the University of New South Wales in Australia, noted that viral droplets are generated by those infected with the novel coronavirus when they cough, sneeze, or speak.

As face masks have been proven to protect healthy people from inhaling infectious droplets as well as reducing the spread from those who are already infected, several types of material have been suggested for these, but based on little or no evidence of how well they work, the scientists said.

In the current study, published in the journal Thorax, the researchers compared the effectiveness of single and double-layer cloth face coverings with a surgical face mask (Bao Thach) at reducing droplet spread.

They said the single layer covering was made from a folded piece of cotton T shirt and hair ties, and the double layer covering was made using the sew method described by the US Centers for Disease Control and Prevention (CDC).

The scientists used a tailored LED lighting system and a high-speed camera to film the dispersal of airborne droplets produced by a healthy person with no respiratory infection, during speaking, coughing, and sneezing while wearing each type of mask.

Their analysis showed that the surgical face mask was the most effective at reducing airborne droplet dispersal, although even a single layer cloth face covering reduced the droplet spread from speaking.

But the study noted that a double layer covering was better than a single layer in reducing the droplet spread from coughing and sneezing.

According to the researchers, the effectiveness of cloth face masks is dependent on the number of layers of the covering, the type of material used, design, fit as well as the frequency of washing.

Based on their observations, they said a home made cloth mask with at least two layers is preferable to a single layer mask.

"Guidelines on home-made cloth masks should stipulate multiple layers," the scientists said, adding that there is a need for more research to inform safer cloth mask design.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 5,2020

With the scrapping of Mitron and Remove China Apps from its Play Store gaining a lot of attention in India, Google on Thursday said that it removed a video app "for a number of technical policy violations", while adding that it also does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps".

Both the apps became immensely popular in India within a short span of time due to the prevailing anti-China sentiment amid border tensions between India and China in Ladakh and calls by Indian activists to boycott Chinese products.

Reports suggested that the Mitron app is a repackaged version of TicTic, which is a TikTok clone.

The Remove China Apps was designed to help users identify applications of Chinese origin.

Without naming the apps, Google hinted that the Mitron app may make a comeback on the Play Store once it fixes some technical issues, but the chances of the Remove China Apps are thin.

"We have an established process of working with developers to help them fix issues and resubmit their apps. We've given this developer (of the video app) some guidance and once they've addressed the issue the app can go back up on Play," Sameer Samat, Vice President, Android and Google Play, said in a statement.

Google said that its Android app store was designed to provide a safe and secure experience for the consumers while also giving developers the platform and tools they need to build sustainable businesses.

Samat said that Google Play recently suspended a number of apps for violating the policy that it does not allow an app that "encourages or incentivizes users into removing or disabling third-party apps or modifying device settings or features unless it is part of a verifiable security service".

"This is a longstanding rule designed to ensure a healthy, competitive environment where developers can succeed based upon design and innovation. When apps are allowed to specifically target other apps, it can lead to behaviour that we believe is not in the best interest of our community of developers and consumers," Samat said.

"We've enforced this policy against other apps in many countries consistently in the past - just as we did here," he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.