Connect with us

Digital Media

Vodafone users take to social media over network outage

Published

on

Spread the love
Read Time: 2 minutes

Services of Vodafone remained affected in Mumbai for the second consecutive day on Friday, wherein many of its customers posted their grievances on the social media platforms. Many customers, on Thursday, took to social media and complained about the network outage that was took place in Borivali, Mira Road, Bhayander, Bandra etc.

The social media has been having people posting their problems. Rusabh Kothari, another Vodafone user, said, “No service for 14 hours now. I have Vodafone Mumbai network, currently in Ahmedabad. Is it going to resolve soon?”

Further, when it comes to telecom sector, majority of the telecom users are of three companies majorly including Vodafone, Airtel and Reliance Jio. Another trouble in telecom that users face is that of call drops.

Meanwhile, DNA had earlier reported as to how out of the total complaints received by Telecom Regulatory Authority of India (TRAI) against call drops between January 1, 2018, and December 5, 2018, Delhi had the highest number of complaints against call drops followed by Mumbai having second highest in the country. Out of 1,073 complaints, around 35 per cent of complaints were from Mumbai and Delhi. According to the data, a total of 163 complaints of call drops were received by TRAI from Mumbai followed by total 220 complaints from Delhi.

Meanwhile, Vodafone said, “The network outage issue occurred only on one evening. The issue was promptly dealt with and resolved. There is no report of issues with the network in Mumbai today. As a result, stating that the issue was faced for the second consecutive day would be incorrect.”

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Nisha Shiwani hails from the pink city of Jaipur and is a prolific writer. She loves to write on Real Estate/Property, Automobiles, Education, Finance and about the latest developments in the Technology space.



Leave a Reply

Your email address will not be published. Required fields are marked *

Digital Media

What is the difference between http and https?

Published

on

By


Spread the love
Read Time: 2 minutes

Time to know this with 32 lakh debit cards compromised in India.

Some of you may be aware of this difference, but it is worth sharing for many that are not.

The main difference between HTTP:// and HTTPS:// is all about keeping you secure.

HTTP stands for HyperText Transfer Protocol.
The S (big surprise) stands for “Secure”. If you visit a Website or web page and look at the address in the web browser, it is likely, to begin with, the following: http://.

This means that the website is talking to your browser using the regular unsecured language. In other words, it is possible for someone to “eavesdrop” on your computer’s conversation with the Website. If you fill out a form on the website, someone might see the information you send to that site.

This is why you never ever enter your credit card number in an Http website! But if the web address begins with https://, that means your computer is talking to the website in a Secure code that no one can eavesdrop on.

Now, you understand why this is so important, right?

If a website ever asks you to enter your Credit/Debit card Information, you should automatically look to see if the web address begins with https://.

If it doesn’t, you should NEVER enter sensitive Information such as a credit/debit card number.

While checking the name of any website, first look for the domain extension (.com or .org, .co, .in, .net etc). The name just before this is the domain name of the website. Eg, in the above example, http://amazon.diwali-festivals.com, the word before .com is “diwali-festivals” (and NOT “amazon”). So, this webpage does not belong to amazon.com but belongs to “diwali-festivals.com”, which we all haven’t heard of before.

You can similarly check for bank frauds. Before your ebanking logins, make sure that the name just before “.com” is the name of your bank. “Something.icicibank.com” belongs to icici; but, icicibank.some1else.com belongs to “some1else”.

Https doesn’t mean it is secure as the https server may be compromised and masquerading as a genuine server. There are many inherent issues in the current standard tls1.2 which will be taken care of by the new protocol tls1.3, which is much more safer

This is a simple, but a good and necessary knowledge to have at times like these.

This useful article for our readers curated from the web.

Continue Reading

Apps

Google now allows you to flag deceptive sites with a new Chrome extension

Published

on


Spread the love
Read Time: 2 minutes

Google’s Safe Browsing feature will only work if it knows what websites to protect you against, which is why the tech giant is encouraging users to report suspicious sites. The company has launched a new Chrome extension called Suspicious Site Reporter, which provides you a quick way to let Google know if a website looks, well, suspicious. It adds a flag right next to your other extensions that turns orange if it finds anything doubtful about the page you’re visiting.

Sometimes the things it considers questionable are as trivial as the website not belonging in the top 5,000. But if it does find something truly unsavory, you can easily notify Google by clicking the Send Report button, which will send the company that website’s URL, a screenshot of it and all the site’s HTML. In the announcement, Google said the extension is for “power users”,presumably, that means system administrators — but we were able to access it and send a report just fine.

In addition, Google is revealing a new feature for Chrome 75 that can prevent you from loading deceptive websites. If you try to load go0gle.com instead of google.com, for instance, the browser will issue a full page warning. It will ask if the legit website is the one you actually want to go to, because you don’t usually visit the one you’re loading.

Continue Reading

Digital Media

World Password DAY: How to secure yours from attackers

Published

on


Spread the love
Read Time: 2 minutes

Passwords have become one of the most important factors in today’s digital world. Every person is needed to have one if they want to have a digital footprint, receive and send emails, use social media platforms, to name few of the many regular uses. To celebrate this May 2 has been declared as the World Password Day.
Many people still use very simple passwords like ‘123456789’ or even ‘their names’, as one recent report showed. If you are among them please change your password soon as a cyber-criminal can easily have access on your digital life. And if you are not one of those and are proud to have a password that will make every password box green and seem small, we congratulate you. However, you still might have danger from an odd phishing attack.

What is a phishing attack?

A phishing attack is carried out by a person to illegally get sensitive information like username, passwords and credit card details of another person. This is done by imitating a reliable entity in an electronic communication.
Like for example, you might get an email that claims to be from Apple saying your password is urgently required or your account will be locked. You click on the same link and then type your password, other details, which are then taken by the hacker, because the email was never actually sent by Apple.
Phishing is one of the most common frauds on the internet as the other person thinks the email to be true and then gives away all their information to the impersonator.

Continue Reading

Digital Media

Facebook chief Mark Zuckerberg wants govt to play ‘more active’ in regulating internet

Published

on

By


Spread the love
Read Time: 2 minutes

Facebook chief Mark Zuckerberg has called for governments to play a “more active role” inregulating the internet, urging more countries to adopt versions of sweeping European rules aimed at safeguarding user privacy.

Facebook and other internet giants have long resisted government intervention, but the leading social network has reversed course amid growing calls for regulation, in an apparent bid to help steer the debate.

“I believe we need a more active role for governments and regulators,” Zuckerberg wrote in an op-ed published in The Washington Post on Saturday.

“By updating the rules for the internet, we can preserve what’s best about it – the freedom for people to express themselves and for entrepreneurs to build new things – while also protecting society from broader harms,” he said.

Mark Zuckerberg argues that new regulations are needed in four areas: harmful content, protection of elections, privacy and data portability.

Facebook has drawn fire over all four, from hate speech on the platform and the recent live streaming of attacks on mosques in New Zealand, to its use in foreign efforts to meddle in elections and concerns over its collection of personal user data.

Addressing protection of user privacy, Zuckerberg said he would support more countries adopting rules in line with the European Union’s sweeping General Data Protection Regulation, which gives regulators sweeping powers to sanction organizations which fail to adhere to heightened standards of security when processing personal data.

“I believe it would be good for the internet if more countries adopted regulation such as GDPR as a common framework,” Zuckerberg wrote, also calling for regulation to guarantee data portability between services.

On harmful content, Zuckerberg said he agreed with lawmakers who have argued that “we have too much power over speech,” saying that “third-party bodies” could set standards on distribution of harmful material and “measure companies against those standards.”

And on elections, Zuckerberg noted that existing laws are focused on candidates and elections instead of “divisive political issues where we’ve seen more attempted interference,” urging legislation to be updated to “reflect the reality of the threats.”

“The rules governing the internet allowed a generation of entrepreneurs to build services that changed the world and created a lot of value in people’s lives,” Zuckerberg wrote.

“It’s time to update these rules to define clear responsibilities for people, companies and governments going forward.”

Continue Reading

Digital Media

Video consumption pushes data traffic by 109% in 2018

Published

on

By


Spread the love
Read Time: 3 minutes

Backed by rising video data consumption on over the top (OTT) players, mobile data traffic in India grew by 109% in 2018, with 4G alone contributing 92%.

Average data usage grew by 69 % in 2018 to touch 10GB a user per month in December, as per Nokia’s annual mobile broadband India traffic (MBiT) index released on Thursday.

OTT players have gained significantly due to operator tie-ups and aggressive 4G network expansion, with high consumption on their platforms. WhatsApp and Instagram are the leading social networking app among subscribers, the report said.

The total number of 4G mobile user stands at 432 million, a jump of 147 % compared to 2017, as lower data tariffs and affordable devices continued to boost usage. However, the current broadband penetration in India is around 45%, which is at a much lower level compared to China at 72%, and other European nations at around 85-95%.

“The surge in broadband consumption is likely to continue in the next few years since the current broadband penetration is just 45% in the country,” said Sanjay Malik, Head of India Market, Nokia said.

Video streaming continues to remain a major contributor to mobile data traffic constituting 70-80% of the total traffic. Over a 90% fall in 4G data prices over the last five years has fueled video streaming in the country and the emergence of short format videos in several social networking apps like Instagram and TikTok has led to deeper engagement levels.

For telecom players, the 4G market has become the new battleground as the only silver lining in the sector is rising data consumption. Incumbents like Airtel and Vodafone Idea have been facing financial constraints with declining margins since the entry of Reliance Jio.

4G has taken off with dirt cheap data tariffs and free voice calls offer from Reliance Jio in late 2016, which was matched by competitors. The disruption shook the market which led to a consolidation phase where three players – Reliance Jio, Vodafone Idea and Airtel have been left along with a telecom PSU BSNL/MTNL.

 

While Reliance Jio operates a pure play 4G/LTE network, other players are expanding their 4G network. Airtel and Vodafone Idea both are in the process of refarming their spectrum for 4G use. Out of the 1 billion mobile users, around 450-500 million are connected to the internet, so the opportunity for players is huge.

The 4G network rollouts will continue this year and the service providers will start preparing the networks for 5G to gain early mover advantage.

Interestingly, the 4G growth has come at the cost of 3G data traffic, which has suffered a marginal decline in 2018. “By the end of 2018, there were more than five times as many 4G subscribers as there were 3G subscribers,” the report said.

Continue Reading

Digital Media

Now you can Zomato your food via Paytm: Details inside

Published

on

By


Spread the love
Read Time: 2 minutes

One97 Communications Limited, the parent firm of Paytm on Thursday announced that it has partnered with Zomato to enable food ordering and delivery service through its mobile app.

With this addition, users can now browse their favorite restaurants within the Paytm App and order food instantly. This service is currently live for Delhi-NCR customers on the Paytm Android app and will soon be made available across India and on the Paytm iOS app as well.

Paytm has a strong user-base across tier 2 & tier 3 cities who use its services for a wide array of everyday payments. With this integration, Paytm would introduce the convenience of online food ordering to its customers which will further augment the growth through a strong uptake among its large user-base.

Renu Satti, Senior Vice President-– Paytm said, “Our association with Zomato is a valuable addition to our platform in bringing the convenience of ordering food online through our app. A vast majority of our customers are from the tier 2 & tier 3 cities, with this new addition we are confident of driving the growth of online food ordering further. It is also an important step towards enhancing the overall offerings to our customers. We will continue to invest our efforts in this direction.”

Mohit Gupta, CEO – Food Delivery, Zomato said, “Paytm is the most popular digital payments platform, with extensive reach across the length and breadth of the country. We are excited to be partnering with them to integrate our online food delivery service with their mobile app. This will allow us to reach a much larger user base and add to the overall experience of ordering from Zomato.”

Continue Reading

Digital Media

Cyber space needs to develop its own AI, radars

Published

on

By


Spread the love
Read Time: 3 minutes

It’s the 30th anniversary of the Computer Security Day that the world started observing in 1988. Many of us who had joined the workforce in the early eighties were by then just getting to know what a computer looked like and what it did for businesses. Internet was yet to be born in its true form. On the mobile communication front, by-now forgotten pagers were all that the world knew of. Thirty years later, Smart Phones are endemic, 4G is on the verge of being passé and IOT is a reality.

Quantum Computing, Big Data, AI and the rapid evolution of the Net are leading us (read, the globe) into a deeply networked village – yes, “the more things change, the more they stay the same”. Our new cyber space stays afflicted with old world issues of conmen, theft and thuggery. Just the tools have changed; new ones are usually invisible to the human eye.

In this context, it’s important that we observe the Computer Security Day as an occasion to reinforce and strengthen our security habits. As individuals, whether at home or at work, we need to maintain integrity and secrecy of our passwords. Frequent changes to passwords is a basic safeguard requirement. Remember Aligarh? We all looked to it for the multi-lever hand crafted locks it made. Passwords are the cyber age equivalent of these locks.

Any chain is as strong as its weakest link. The same dictum applies to the Internet. Thugs and their ware – should we say, thuggery-ware, usually referred to as worms, viruses, Botnets, Trojans, ransomware, spyware, etc. can and do use every chink in the network to stage thefts, heists or simply prove their prowess in unsettling our life-as-usual. Given the millions of mobiles, tablets, laptops, desktops and myriad other endpoints in use, it’s a Herculean task to secure the cyber networks. Cyber hygiene, anti- virus applications and 24/7 watch over network traffic via sophisticated AI-driven algorithms have helped. Detection and neutralising of cyberattacks as they happen may add to the armour, but cyber incidents, often cross border, continue to be a fast-growing threat category (FGTC). To counter this reality, a range of new businesses and institutions have emerged. Data and Network Security are a big industry. Computer Emergency Response Teams (CERTs) are operational in various countries to track and coordinate security efforts in the cyber space. Banking regulators globally are monitoring the financial system for steps taken to prevent security breaches and intrusions. With the pervasive reliance on computer systems and networks, other industries too – be it power distribution or transport services or, even health, are exposed to hacking possibilities.

The cyber landscape is on the cusp of a major change.  The writer is deputy MD and chief risk officer, SBI.

Continue Reading

Digital Media

Tips for creating a Secure Password

Published

on


Spread the love
Read Time: 3 minutes

Passwords are your first line of defence against any internet threat. Sadly very few people recognise this fact.  Though the passwords are not the perfect security solution, if you put in some more effort they can provide a great security boost to your online and offline systems.

In any case, a password is not very useful if someone can simply crack it by guessing or by looking over your shoulder. So, here are some security tips that can be kept in mind while compiling a high security password.

  • You can use a password manager to create a password: A good password manager can create strong and unique password for any and all of your accounts. This means that if one of your passwords is leaked in a data breach any person with a harmful intent would still have to struggle with other online services and subscriptions. The best password managers are those which sync across desktop and mobile. You could even remember just one key, rather than having to memorize more than dozens of long and complicated passwords.
  • Choose a longer password: In the case of passwords’ security, length matters more than the complexity of the combination. Once you have extended it to 12-15 character range, it will become way harder for a hacker to guess or crack it solely on the basis of brute force. And try to use some special characters rather than using the name of your favourite band.
  • You can keep the special characters apart: You have to keep in mind not to bunch together special characters like !,@,#,$,% etc. This is exactly what people do and this means that this is what the potential threats are looking for. To make the guesswork extra tricky you have to space them apart.
  • Don’t change the passwords too regularly: This is a tricky one. But keep in mind that the less often you change your password, the less likely you are to forget it. You may even fall into a pattern, like changing only a number at the end each time you update your password. This only makes it easier to crack the password.
  • Single purpose passwords only: At the very least you need to make sure that you don’t use the same passwords across different online services and accounts. If you do this then a retailer breach that you have no control over could cost you your most confidential banking password.
  • Never to trust your browser with passwords: A convenient shortcut that everyone falls into habit of using is to let your browser remember them for you. You must have seen the option yourself. I can even bet that you use it on at least one site. Don’t use it anymore. The option for the browser to remember the passwords is really convenient, but the taxing of security is very high. If you really need a free and easy option, go with a good and respectable password manager instead of trusting everything to your browser.
  • Enable OTP protection wherever it is possible: In these days of ever increasing online security threats, not even a password is enough to safeguard your privacy. Many of the services like, commercial banks, Google, etc. offer another layer of protection. This protection can come in the form of a numeric code that is sent to your phone via SMS. This is more than enough for most people. Just keep in mind that this is also not completely foolproof.

 

-Archit

 

 

Continue Reading

Digital Media

How to find that your yahoo mail account has been hacked?

Published

on


Spread the love
Read Time: 3 minutes

It is extremely essential to protect your email represent a client with the goal that client can’t confront any sort of inconvenience. Regardless of whether business client or some other person who utilizes Yahoo mail benefit it is important that their critical data’s ought to be secured. In the event that your record gets hack it will straightforwardly influence your word related life in light of the fact that vital information of your work life can be spilled. Additionally, financial balance points of interest of the clients can be abused in this way, it is critical for a client to deal with their record.

It is extremely critical to you to deal with your record and put an eye on your sends. Yahoo bolster squad gives 24*7 help to its clients by giving data. Following are somewhere in the range of few stages which will make your record safe:

The initial step is to turn on your PC or workstation at that point watch that your web association is ON.

At that point go to Yahoo mail login page there enter your email address and watchword. Presently go to account settings and change your secret key and remember that your watchword ought to be solid.

In the wake of finishing the above advances, you need to move your mouse to “Record Info” page at that point on upper right of the page go to Yahoo Avatar where in list tap on “Record Info” there ensure your watchword.

In subsequent stage, you need to move to “View your current sign-in action” where you will get present login subtle elements of your record. While checking the login points of interest and on the off chance that you discover a login from not the same as nation then your record has been utilized by another person.

At that point move to the organizer “sent” of your post box, there check your sent sends and on the off chance that you discover sends which were not sent by you then it implies somebody was utilizing your record then it implies somebody has hacked your record. You can likewise keep an eye on “Waste” organizer as erased messages go to Trash envelope.

At the point when your antivirus application begin working you will discover angry code that permitted your login data stolen. On the off chance that on the off chance that you don’t have antivirus application introduce it on your PC and begin examining.

Call Yahoo support number in the event that you discover any trouble as they will give you right heading by giving you data. The previously mentioned advances are valuable to you as it secures the record.

Continue Reading

Digital Media

How clients can get back the erased messages in yahoo account?

Published

on


Spread the love
Read Time: 2 minutes

At times clients of hurray account erroneously erase the messages from their record which influences them to agitate. Thus, clients of hurray account don’t have to stress over the erased messages as yippee offers to get back the messages of yours. When you erase your messages from your inbox the messages consequently move to “Waste” box. Furthermore, if your “Junk” box is void than additionally you can get back your messages in “Re-establish” highlight.

Following are a few stages of recuperating the erased messages which are done erroneously:

The initial step is to turn on your PC or workstation at that point watch that your web association is ON.

Presently go to yippee login page and enter your email address and watchword. On left half of your screen you will see “Waste” organizer where you can check if erased messages are there.

After the above advance, you have to open the message and from the yahoo toolbar tap on “Move”. At that point select “inbox” or some other envelope of your decision where you need to exchange the email.

Indeed, even you can utilize “seek” to discover the related messages and you can look messages by entering email address or any related watchwords.

You can even utilize the Yahoo “Re-establish” include keeping in mind the end goal to get back your messages which were erased in the previous 24 hours. This element is utilized when your “Junk” organizer is void. Over the screen tap on “help” alternative and from the dropdown list again tap on “help”.

After fruition of above advances select messaging and afterward select on “Erasing and recuperating messages” and now tap on “re-establish lost or erased messages”

Read the guidelines which can be seen on your screen and fill the directions effectively then submit it. You will get affirmation when you will recover the messages.

In the event that you locate any sort of trouble while following these means you can essentially call Yahoo specialized help number where they will resolve every one of your issues and furthermore, they will give you redress counsel and direction. What’s more, on the off chance that your messages get erased erroneously you can take after the previously mentioned ventures for recuperation.

Continue Reading

More From NewsViewsNetwork

Subscribe To Our NewsletterDon't worry, we too hate spam.

Join our mailing list to receive the latest news and updates from around the world in your area of interest.