"Make it a Better Please for all-Help Each Other" Thank you for visiting! Please Visit again soon.
IMPORTANT WEBSITE & BLOGS
- BSNL
- DOPT
- Deshabhimani,Malayalam News
- E Filling Income Tax Return E Filling Portal
- GMAIL
- INCOME TAX OF INDIA
- India Post
- Indiavision Live Online TV
- Kerala Chief Minister
- Kerala Kaumudi E-paper
- Kerala Kaumudi Online
- Kerala Kaumudi calander
- Kerala Postal Circle
- Make Money - Google Adsense
- Malayalam Calander
- Malayalam Movie Watch Online
- Manoramaonline
- PTC Mysore
- Raiway Passenger Reservation
- The Hindu News Paper
- Web Directory
- Yahoo
- ePost office
സ്ത്രീകള് എങ്ങിനെ വസ്ത്രം ധരിക്കണം എന്ന് പുരുഷന് നിഷ്ക്കര്ഷിക്കുന്നത് ശരിയോ? അല്ലെങ്കില് തിരിച്ചും?
Tuesday, November 27, 2012
How IDA increase is calculated?
How IDA increase is calculated?
We have been reporting the increase in IDA every three months, always before official announcement is made.
We have not been making predictions or assumptions. Our reporting has
always been based on standard calculation used for the purpose. We feel
that the members also should be aware of the calculation. Hence this
article.
The IDA rate revision is based on All India Consumer Price Index. After
Second Pay Revision w.e.f. 1.1.2007, the base index has also been
revised to 1.1.2007, which is 126.33
For arriving at IDA increase we need to know the All India Consumer
Price Index for Industrial Workers [CPI(IW)] for the previous three
months. For IDA revision w.e.f. 1st July of a year, the CPI of March,
April and May are required. For IDA revision w.e.f.1st October, CPI of
June, July and August are required and so on.
The average CPI of the three months is then taken for calculation and the following formula is used:
New IDA rate = (Average CPI – Base Index) x 100 / Base Index
Increase in IDA rate = New IDA rate – Old IDA rate
Example:
CPI for
June 2009 - 153
July 2009 - 160
August 2009 - 162
Average: 158.33
Calculation: 158.33 – 126.33 x 100
-------------------------- = 25.3
126.33
IDA rate w.e.f. 1.7.2009 was 18.5
Therefore Increase in IDA rate w.e.f.1.10.2009 was = 25.3-18.5 = 6.8
CPI for a month is notified on the last day of the next month in Labour
Bureau Website at http://labourbureau.nic.in/indnum.htm. This
information is also published in ‘The Hindu’ on the first day of every
month in Business column.
That’s all. It is so simple. Now, any one can on his own calculate the
IDA rate increase w.e.f. 1.4.2010, on 31st March 2010 itself. Those who
don’t want to take that little effort can login
to http://www.aibsnloa.org/related/idacalculation.xls and just fill in
the CPI for February 2010 and get the magic figure of Increase in IDA
rate w.e.f.1.4.2010.
Courtesy: Com.V.V.S.Murthy, Vijayawada.
Source: www.aibsnloa.org
[http://www.aibsnloa.org/related/idacalculation.pdf]
ADDITIONAL LTC BENEFITS TO NEWLY RECRUITED CENTRAL GOVERNMENT EMPLOYEES
Leave Travel Concession for Central Government employees in
general provides for reimbursement of fare entitled to the employee and
his / her family concerned for the travel to home town twice in four
years or to a place any where in India in lieu of one home town travel
concession once in four years.
As far as newly recruited Central
Government Employees are concerned, LTC Scheme provides for some
additional benefits which are discussed in this article.
LTC Scheme after implementation of Sixth Pay Commission report – Benefits to Fresh Recruits in the form of additional LTC trips
LTC Rules amended after implementation of sixth pay commission provides certain more Benefits to Fresh Recruits in the form of
allowing additional home town trips under LTC (after completion of one
year of continuous service in central government service)
As per the amendment made
in Rule 8 of LTC Rules, Fresh recruits to Central Government may be are
allowed to travel to their home town along with their families on three
occasions in a block of four years and to any place in India on the
fourth occasion.
This facility shall be available
to the Government officers only for the first two blocks of four years
applicable after joining the Government for the first time. In other
words after completion of one year of continuous service in Central
Government service one can avail LTC for three Home town trips and one
All India trip in each of two LTC blocks that fall in in the first eight
years of Government service
The blocks of 4 years shall apply with
reference to the initial date of joining the Government even though the
employee changes the job within Government subsequently. The existing
blocks will remain the same but the entitlements of the new recruit will
be different in the first eight years of service.
After grant of this additional
LTC benefits to fresh recruits, doubts were raised whether this
additional benefits can be allowed Central Government Employees who have
joined in the Government Service prior to 23.09.2008 (i.e. before the date of issue of OM) but yet to complete 8 years of service.
Later, DOPT clarified in this
aspect to the effect that all Government servants who have not completed
8 years of service as on 01.09.2008 would be entitled for the LTC
benefits available to fresh recruits.
Married and unmarried Central Government Employees can travel to home availing LTC once a year in one block of 4 years:**
This benefit was available even
prior to implementation of sixth pay Commission. Under this clause,
Married and unmarried Central Government Employees can travel to home
availing LTC once a year in one LTC block of 4 years. There is no
restriction in the form of number of years of service to avail LTC in
this clause. However, this LTC for travel to home town once a year in
the block of 4 years restricted to employee only. The family of the
employee is not entitled LTC under this clause.
However, following conditions are to be satisfied in order to avail additional Home Town Trips in one LTC block:
1.The family of Central Government Employee should be living away from him/her at her/his home town.
2.No
other LTC claim including LTC to all India and home town can be made by
the employee for self and his/her family in the LTC block.
(** It is just an assumption that
family of fresh recruits would usually be away from him/her at his/her
home town. In fact this facility is available all central government
employees whose family is at home town. There is no restriction in the
form of number of years of service completed)
Courtesy : http://gconnect.gnaukri.in/
ഓണ്ലൈന് ഫോട്ടോ എഡിറ്റിംഗ് ടൂളുകള്
സ്വന്തം ഫോട്ടോസ് എഡിറ്റ് ചെയ്ത് മനോഹരമാക്കാന് ആഗ്രഹിക്കാത്തവരായി ആരും ഉണ്ടാവില്ല. ഫോട്ടോഷോപ്പ് പോലെയുള്ള ആപ്ലിക്കേഷനുകള് അതിനുള്ള സാഹചര്യങ്ങള് ഒരുക്കിത്തരുന്നുണ്ട്. എന്നാല് നല്ല പരിചയവും പരിശ്രമവും ഉണ്ടെങ്കില് മാത്രമേ നല്ല ഫലം ഉണ്ടാക്കാന് കഴിയൂ. മാത്രമല്ല സമയനഷ്ടവും ഉണ്ടായേക്കാവുന്നതാണ്.
ഞാനിവിടെ പരിജയപ്പെടുത്തുന്നത് ഓണ്ലൈന് ആയി ഫോട്ടോകള് എഡിറ്റ് ചെയ്യാനുള്ള ചില സാധ്യതകളെയാണ്. താഴെ പറയുന്ന സൈറ്റുകള് നിങ്ങളെ അതിന് സഹായിക്കും
www.funphotobox.com
www.dumpr.net
www.hairmixer.com
www.photo505.com
www.magmypic.com
sources http://boolokam.com/archives/76129#ixzz2DNUuPdDd
Sunday, November 25, 2012
ശ്വേതയുടെ പ്രസവവും ഷൂട്ടിംങ്ങും ചില ചിന്തകളും
സിനിമ ഒരു പബ്ലിക് പ്രോപര്ട്ടിയാണ്. ഒരു സാംസ്കാരിക ഉത്പന്നമാണ്. അപ്പോള് അതിനെക്കുറിച്ച് ചര്ച്ചകള് ഉണ്ടാവും.
ബ്ലെസ്സീ, ബ്ലൂ സീ എന്ന് വിളിപ്പിക്കരുത്
ഏതൊരു സംവിധായകനെ സംബന്ധിച്ചിടത്തോളവും ഓരോ സിനിമയും ഓരോ പ്രസവമാണ്. സൃഷ്ടിയുടെ പേറ്റുനോവ് അനുഭവിച്ചിട്ടാണ് ഓരോ സിനിമയും പിറവി കൊള്ളുന്നത്. ഈ സിനിമ പ്രദര്ശിപ്പിക്കാന് ഫിലിം എക്സിബിറ്റേഴ്സ് അസോസിയേഷന് സമ്മതിക്കാത്ത പക്ഷം ബ്ലെസ്സിയുടെ ഗര്ഭവും പേറ്റുനോവും വെറുതെയാവും. ശ്വേതയുടെ മാര്ക്കറ്റിനും ഇടിവ് തട്ടും. ( മഴവില് മനോരമ ഉള്ളത് കൊണ്ട് കഞ്ഞികുടി മുട്ടില്ല എന്ന് മാത്രം). ശ്വേത, ലേബര് റൂം, പ്രസവം എന്നൊക്കെ കേള്ക്കുമ്പോള് കോളേജ് പിള്ളേര് തിയേറ്ററിലേക്ക് ഇടിച്ചു കയറും എന്നൊരു കണക്കുകൂട്ടലിലാണ് ബ്ലെസ്സി ഈ സിനിമ പിടിച്ചത്. രണ്ടുമൂന്നു സിനിമ ഒന്നിച്ചു പൊട്ടിയതിന്റെ ക്ഷീണം അതോടെ തീര്ന്നു കിട്ടും എന്നും കരുതി. പ്രതീക്ഷിച്ച വിവാദങ്ങളും വാര്ത്തകളും കാരണം വേണ്ടത്ര പ്രചാരണങ്ങള് സിനിമക്ക് കിട്ടുകയും ചെയ്തു. ഇനി പ്രസവ സീനില്ലാതെ സിനിമ ഇറങ്ങിയാല് കിട്ടിയ പ്രചരണം തിരിഞ്ഞു കൊത്താന് തുടങ്ങും.
സ്പീക്കര് ജി കാര്ത്തികേയന്, സെബാസ്റ്റ്യന് പോള്, കവിയൂര് പൊന്നമ്മ, ജി സുധാകരന് തുടങ്ങി നമ്മുടെ രാഷ്ട്രീയ സാംസ്കാരിക രംഗത്തെ പലരും ഈ ലേബര് റൂം സിനിമക്കെതിരെ രംഗത്ത് വന്നു കഴിഞ്ഞു. ഈ സിനിമ പുറത്തിറങ്ങാന് പാടില്ല എന്നാണ് സമാദരണീയനായ സ്പീക്കര് പറഞ്ഞത്. എന്തിനധികം നമ്മളെയൊക്കെ ഞെട്ടിച്ചു കളഞ്ഞു കൊണ്ട് രഞ്ജിനി ഹരിദാസ് പോലും ഇതിനെതിരെ പ്രതികരിച്ചു എന്നാണു കേള്ക്കുന്നത്!. സ്ത്രീയുടെ വ്യത്യസ്ത ഭാവങ്ങള് ചിത്രീകരിക്കുന്നതിന്റെ ഭാഗമായാണ് പ്രസവം ലൈവാക്കി ചിത്രീകരിച്ചത് എന്നാണു ബ്ലെസ്സിയുടെ വാദം. സ്ത്രീത്വവും മാതൃത്വവും പ്രകൃതിയുടെ അതീവ ശ്രേഷ്ഠമായ ഭാവങ്ങളാണെന്നും അവ ചിത്രീകരിക്കുന്നതിലൂടെ സ്ത്രീ മഹത്വവത്കരിക്കപ്പെടുകയും അംഗീകരിക്കപ്പെടുകയും ചെയ്യുമെന്നാണ് തിയറി!. ക്യാമറയും ലൈറ്റ് ബോയും സംവിധായകനും ഇല്ലാതെ ഭൂമുഖത്ത് ഇക്കാലമത്രയും പ്രസവിച്ച അമ്മമാരുടെയൊക്കെ മഹത്വം ഇതോടെ കട്ടപ്പൊകയായി. പ്രിയ ബ്ലെസ്സീ, പ്രസവത്തിലേക്ക് കാര്യങ്ങള് എത്തുന്നതിനു മുമ്പും സ്ത്രീകള്ക്ക് 'അതീവ ശ്രേഷ്ഠമായ' ചില പ്രകൃതി ഭാവങ്ങളുണ്ട്. അത്തരം 'പ്രകൃതി' ഭാവങ്ങളൊക്കെ ചിത്രീകരിക്കാന് തുടങ്ങിയാല് താങ്കളുടെ പേര് ബ്ലെസ്സി എന്നതിന് പകരം 'ബ്ലൂ' 'സീ' എന്നാക്കേണ്ടി വരും!. കാശും പബ്ലിസിറ്റിയും കിട്ടുമെങ്കില് എന്ത് പണ്ടാരവും ചെയ്യാന് മടിക്കാത്ത നടിമാര് കാണും. പക്ഷെ താങ്കളെപ്പോലൊരു സംവിധായകന് അത് ചേര്ന്നതല്ല.
ഏതൊരു സ്ത്രീയെയും പോലെ പ്രസവിക്കാന് ശ്വേതക്കും അവകാശമുണ്ട്. സിനിമ നടികള് നാല്പത്തിരണ്ട് വയസ്സ് കഴിഞ്ഞ ശേഷമേ പ്രസവിക്കാന് പാടുള്ളൂ എന്ന നിയമം കേന്ദ്ര സര്ക്കാര് അംഗീകരിച്ചതല്ല, ബോളിവുഡ് നിര്മാതാക്കള് ഉണ്ടാക്കിയതാണ്. ആര്ക്കും എപ്പോഴും പ്രസവിക്കാമെന്നതും പ്രസംഗിക്കാമെന്നതുമാണ് നമ്മുടെ ഭരണഘടനയുടെ ഏറ്റവും വലിയ പ്രത്യേകത തന്നെ. ശ്രീമതി ശ്വേതക്കും ബ്ലെസ്സിയുടെ ഭാര്യയ്ക്കുമൊക്കെ ഈ അവകാശമുണ്ട്. അവര് പ്രസവിക്കട്ടെ. കുഞ്ഞുങ്ങളെ അവരോ ആയമാരോ വളര്ത്തട്ടെ. പക്ഷേ ലേബര് റൂമിലെ പ്രകൃതി ഭാവങ്ങള് നാല് ക്യാമറ വെച്ച് പകര്ത്തി നാട്ടുകാരെ കാണിച്ചേ അടങ്ങൂ എന്ന് പറയരുത്. നമ്മുടെ സംസ്കാരത്തോടും സ്ത്രീത്വത്തോട് തന്നെയുമുള്ള കടന്നാക്രമണമാണത്.
വര്ത്തമാനം 25 Nov 2012
പ്രിയ ബ്ലെസ്സീ, മുംബൈയിലെ സ്വകാര്യ ആശുപത്രിയില് വെച്ചു ചിത്രീകരിച്ച പ്രസവ സീനിന്റെ സി ഡി കള് ബാങ്ക് ലോക്കറിലാണ് സൂക്ഷിച്ചിരുന്നതെന്ന് താങ്കള് പറഞ്ഞിരുന്നു. ഒരു കത്രികയെടുത്ത് സിനിമയുടെ പ്രിന്റില് ഒരു സിസേറിയന് നടത്തൂ.. ആ സീനുകള് ലോക്കറിലേക്ക് തന്നെ തിരിച്ചു വെക്കൂ. അതവിടെത്തന്നെ കിടക്കട്ടെ. ശ്വേതയുടെ കുഞ്ഞിനു പ്രായപൂര്ത്തിയായിട്ടു അവള്ക്കത് പുറത്തു വിടണമെന്ന് തോന്നുന്നുവെങ്കില് അവളതു പുറത്തു വിടട്ടെ. ആ കുഞ്ഞിനുമുണ്ടാകുമല്ലോ മനുഷ്യാവകാശവും ആത്മാഭിമാനവും. നായികയുടെ പ്രസവം തിരക്കഥയില് അത്യാവശ്യമാണെങ്കില് അതിനുണ്ടോ പ്രയാസം. എത്രയെത്ര സിനിമകളില് നായികമാര് പ്രസവിച്ചിരിക്കുന്നു. നായകന് ബീഡി വലിച്ചു അസ്വസ്ഥനായി പ്രസവ റൂമിന് മുന്നില് ഉലാത്തുന്നു. സിസ്റ്റര്മാര് അങ്ങോട്ടും ഇങ്ങോട്ടും ഓടുന്നു. ഇടയ്ക്കു ഒരു കുട്ടിയുടെ കരച്ചില് കേള്ക്കുന്നു. ചുരുങ്ങിയത് രണ്ടു വര്ഷം പ്രായമായ ഒരു കുഞ്ഞിനെ ശീലയില് പൊതിഞ്ഞു കൊണ്ടുവരുന്നു. നായിക നായകനെ നോക്കി കണ്ണിറുക്കുന്നു. തീര്ന്നു. സീന് ഓ കെ. ഈ പുകിലൊക്കെ ഉണ്ടാക്കേണ്ട വല്ല കാര്യവുമുണ്ടോ? സിനിമ പൊട്ടുന്നതും വിജയിക്കുന്നതുമൊക്കെ പതിവുള്ളതാണ്. ഭാഗ്യമുണ്ടെങ്കില് താങ്കളുടെ സിനിമകള് ഇനിയും വിജയിക്കും. അതിനൊരു ലേബര് റൂമിന്റെ ആവശ്യമില്ല.
എഴുതിയത് ബഷീര് വള്ളിക്കുന്ന്
എഴുതിയത് ബഷീര് വള്ളിക്കുന്ന്
എല്ലാം ഇവിടെയുണ്ട് www.vallikkunnu.com- Web |
- More Posts (237)
Read more: http://boolokam.com/archives/75730#ixzz2DCDHp1nC
എഴുതിയത് ബഷീര് വള്ളിക്കുന്ന്
എല്ലാം ഇവിടെയുണ്ട് www.vallikkunnu.com- Web |
- More Posts (237)
Read more: http://boolokam.com/archives/75730#ixzz2DCDHp1nC
എഴുതിയത് ബഷീര് വള്ളിക്കുന്ന്
എല്ലാം ഇവിടെയുണ്ട് www.vallikkunnu.com- Web |
- More Posts (237)
Read more: http://boolokam.com/archives/75730#ixzz2DCDHp1nC
എഴുതിയത് ബഷീര് വള്ളിക്കുന്ന്
എല്ലാം ഇവിടെയുണ്ട് www.vallikkunnu.com- Web |
- More Posts (237)
Read more: http://boolokam.com/archives/75730#ixzz2DCDHp1nC
NO EXAMINATION IN APS
Copy of Directorate’s Memo No. A-34020/11/2011-DE dated 15/2/2011 is reproduced below:
Subject : Discontinuation of conducting examination in APS Units/Centres.
Sir,
I am directed to say that system of all Departmental Examinations is being revised.
In
this connection, Competent Authority has decided that the following
Examinations hitherto being conducted in the APS units are discontinued.
i) Examination for promotion to Postman cadre;
ii) Examination for promotion to PAs/SAs (LGO);
iii) Examination for promotion to Inspector Posts;
Candidates
working in APS who wish to attend the above mentioned Examinations will
have to appear at the nearest possible Postal Centres.
Yours faithfully,
Sd/-
(L. Mohan Rao)
Assistant Director General (DEYou might also like:
ID Proofs Compulsory During Train Journey in All Reserved Classes from 1st December 2012
With effect from 01.12.2012, one of the passengers booked on a ticket
for undertaking journey in any reserved class will have to produce any
one of the prescribed proofs of identity failing which all the
passengers will be treated as travelling without ticket and charged
accordingly.
This provision shall, however, not affect the existing provision of
Tatkal scheme where during the journey, the passenger is required to
show the original proof of identity indicated on the ticket.
The number of prescribed proofs of identity have been increased from
nine to ten by adding following identity card to the list of prescribed
proofs identity:-
“Photo identity cards having serial number issued by Public Sector
Undertakings of State/Central Government, District Administrations,
Municipal bodies and Panchayat Administrations”
This information was given by the Minister of State for Railways Shri
Kotla Jaya Surya Prakash Reddy in written reply to a question in Rajya
Sabha today.
Source : PIB, 23 Nov, 2012
You might also like :
10 sure-shot ways to save money & improve your finances
One of the quickest ways to improve your finances is to reduce your spending and find more ways to save money.
Unfortunately, there are still many people around who find it difficult
to save, most of the times putting the blame on their 'insufficient'
income. This is, however, not true as various studies have already
proved that how much you save has little to do with how much you make.
If you are also among those who usually find it hard to save, there are
some innovative and sure-shot ways which can help you save more and also
improve your financial health in line with your goals.
Here we take a look at some of them:
1. Stick to the budget: One of the surest ways to cut your spending and
save more is sticking to the monthly budget and resorting to forced savings. This system always works, regardless of the kind of job you have or your income.
Giving an example, Lovaii Navlakhi, MD & chief financial planner,
International Money Matters Pvt Ltd, says that he knows of a client who
segregates her monthly expenses in envelopes, for example, for
groceries, eating out, fuel costs for two wheelers, etc. If the family
decides to go out at the end of the month, the venue is dependent on
what amount is left in the 'eating out' envelope. Similarly, the
children may resort to travelling by bus if the 'fuel costs' have run
out. This way they are able to budget their expenses and save as per
their goals.
2. Take a 'no buy' day or week: Another important way to help with
saving money and keeping a quality budget is 'spending freezes'. This
means for the entire time of the 'no buy' break, you aren't allowed to
buy anything new, or to go shopping. Exceptions to the 'no buy' time
might include paying for medicines, food and emergencies that come up
like a car breaking down. "Save the money you would have normally spent
during the day or week you are on the 'no buy' break and invest that amount by the end of the month," says Navlakhi.
3. Avoid buying on impulse: Do you often purchase something and then get
it home to find you aren't excited about it any longer? It happens with
most of us. Therefore, if you are in the habit of spending on impulse,
make an effort to have a moment of reflection before buying anything.
"If you see something you would like to buy, try waiting a day or two
before actually committing yourself to buying. If you really want it,
you will come back. This will not only help you save more money, but
also give you the chance to find other things that may be better," says
Atul Surana, certified financial planner and MD of Mangalore-based
Catalyst Financial Planning.
4. Avoid spending by habit: Quite often a lot of our spending is a daily
habit. However, this spending could easily be unnecessary. For example,
if you buy a takeaway coffee everyday for your office staff / visitors,
why not invest in a coffee machine? "Just because you spend Rs 200 a
day on lunch, doesn't mean this habit has to continue for ever. Try
taking your own lunch. Re-evaluate all your habitual
spending patterns and decide whether it is necessary," says Surana.
This will help you cut your unnecessary spending and save more.
Source : The Economic Times, 24 Nov 2012
Pension Fund Regulatory and Development Authority (PFRDA) Bill-2011
Pension Fund Regulatory and Development Authority (PFRDA) Bill-2011
The Pension Fund Regulatory and Development Authority Bill, 2005 was
initially introduced in Lok Sabha in March, 2005 to provide for a
statutory PFRDA. However, since the Bill and the official amendments,
based on the recommendations of the Standing Committee on Finance, could
not be considered by the Lok Sabha, the Bill lapsed on dissolution of
the 14th Lok Sabha.
The Government has announced in the Budget 2011-12 that the revised
PFRDA Bill would be moved in the Parliament. Accordingly, PFRDA Bill,
2011 was introduced in Lok Sabha on the 24th March, 2011 to provide for a
statutory regulatory body the Pension Fund Regulatory and Development
Authority (PFRDA) under the provisions of the Bill. The legislation
sought to empower PFRDA to regulate the New Pension System (NPS). The
PFRDA Bill, 2011 was referred to the Standing Committee on Finance on
the 29th March, 2011 for examination and report thereon. The Standing
Committee on Finance gave its Report on 30th August, 2011.
The Government decided to accept the recommendations of the Standing
Committee on Finance. Based on the recommendations of the Standing
Committee, the official amendments to the PFRDA Bill-2011 a proposal to
move these additional official amendments in the ensuing session of the
Parliament, was approved by the Union Cabinet in its meeting held on
4th October, 2012.
The PFRDA Bill, 2011, inter alia, provides for:
(i) Establishing a statutory Pension Fund Regulatory and Development Authority (PFRDA):
(a) to promote old age income security by establishing, developing and regulating pension funds;
(b) to protect the interests of subscribers to various schemes of pension funds.
(ii) Empowering PFRDA to :
(a) regulate the New Pension System and other pension schemes not covered under any other Act;
(b) register and regulate pension funds and the central recordkeeping agency;
(c) frame investment guidelines for pension funds;
(d) levy monetary penalties for violations of various provisions of the PFRDA Act;
(iii) Imprisonment upto 10 years by courts for contravention of the PFRDA Act, etc. or fine upto Rs. 25 crore or both; and
(iv) Subjecting subordinate legislation to Parliamentary scrutiny.
Source: www.financialservices.gov.in
[http://financialservices.gov.in/PFRDA%20Bill_2011.pdf]
You might also like:
Friday, November 23, 2012
How to manage frauds that go mobile?
Since the release of the original iPhone, one billion smartphone activations and 700 million downloads ofAngry Birds later, mobile devices have proliferated.
Financial service organizations are tapping into this market by moving products and services to mobiles, delivering specialized small-screen adaptations for browsing, and developing apps that supply mobile functionality and services that enable customers anywhere-anytime access to account information.
Mobile banking alone is expected to grow to nearly 900 million users by 2015.
While a majority of fraud attempts are still targeted at users in the online channel, as banking services go mobile, so are the attacks that target banking customers. Here are some of the most common attack methods being used by cyber-criminals to target mobile banking users today.
Smishing, or SMS phishing, sends a text message to a user's mobile phone in an attempt to get her to divulge personal information. As is the case with phishing, a smishing attack usually has a call to action for the intended victim that requires an immediate response.
Smishing has become easier to do and is becoming an attractive alternative with higher success compared tophishing as consumers are not conditioned to receiving spam on their mobile phone, so are more likely to believe the communication is legitimate.
Furthermore, whereas a majority of phishing emails get stopped by spam filters and often never reach their intended targets, there is no mainstream mechanism for weeding out 'spam' text messages.
Some mobile malware is programmed to conduct man-in-the-middle attacks, capable of forwarding SMS messages with a user's Mobile Transaction Numbers (mTANs) to an attacker. These mTANs are often used as a way for banking customers to confirm that they initiated a transaction.
By intercepting the code, cyber-criminals can initiate a transaction and then use the unique code to verify the transaction as though they were the legitimate user. Examples of man-in-the-mobile threats have been most commonly found within well known banking Trojans such as Zeus and SpyEye.
Rogue applications are becoming plentiful in most online app stores. Today, Android is the most common platform being exploited by cyber-criminals. Recently, a new Android Trojan was discovered that displays a video downloaded from the net — only if some sensitive information is previously sent to a remote server.
Today, RSA's Anti-Fraud Command Center is witnessing an average of about 3 per cent of all fraudulent transactions originating in mobile channels or devices. While this hardly compares to the percentage of fraud in the online channel, mobile threats continue to emerge and, in time, that number will rise.
Here are some expected mobile threats and developments in the coming year.
Smishing will continue to increase. Many financial institutions have been successful in getting standard phishing attacks under control. However, smishing presents a whole new series of challenges.
Phone flooding services increase in popularity. Out-of-band authentication via SMS or phone call is being used across the financial industry as a step-up authentication method for high-risk transactions.
To overcome this additional security, cyber-criminals flood an intended victim's phone with calls, ultimately rendering the phone useless and interfering with bank's attempt to alert a user to a high risk transaction.
Banking Trojans continue to be developed for mobiles. There have been several attempts at coding SpyEye variants for mobile platforms (mainly Android). These custom codes are designed to attempt intercepting SMS codes sent during transaction authentication by forwarding the content of the text message to the attacker's server.
The code is still young and its presence on mobile phones is limited. However, cyber-criminals are focusing their efforts on the mobile platform.
New Trojan plug-ins are targeting the mobile phone. Many banking Trojans available for sale in the black market offer plug-ins that enable HTML injection. When an infected user attempts to access her online bankingsite, the Trojan automatically injects extra fields in the login page. Most often, the extra details cyber-criminals attempt to obtain are credit card numbers and ATM PIN codes.
Portable nature of mobile devices — and information that is stored or accessed on them — is what makes them so vulnerable (when was the last time you misplaced your desktop?).
Also, if a mobile device is lost or stolen, it is typical for consumers to call their mobile provider to report it, but they don't usually call their bank to report it. If the user engages in mobile banking, all financial information stored on the device could be easily accessed.
Attacks are evolving in the mobile channel and as the popularity of mobile banking grows, financial institutions are challenged with how to translate the success they have had in managing fraud risk in the online channel and applying those same best practices to the mobile channel.
Understanding how to secure your customers against mobile attacks is the first step in turning the tide on fraud — and taking full advantage of the opportunities that this channel presents.
Source : http://economictimes.indiatimes.comFinancial service organizations are tapping into this market by moving products and services to mobiles, delivering specialized small-screen adaptations for browsing, and developing apps that supply mobile functionality and services that enable customers anywhere-anytime access to account information.
Mobile banking alone is expected to grow to nearly 900 million users by 2015.
While a majority of fraud attempts are still targeted at users in the online channel, as banking services go mobile, so are the attacks that target banking customers. Here are some of the most common attack methods being used by cyber-criminals to target mobile banking users today.
Smishing, or SMS phishing, sends a text message to a user's mobile phone in an attempt to get her to divulge personal information. As is the case with phishing, a smishing attack usually has a call to action for the intended victim that requires an immediate response.
Smishing has become easier to do and is becoming an attractive alternative with higher success compared tophishing as consumers are not conditioned to receiving spam on their mobile phone, so are more likely to believe the communication is legitimate.
Furthermore, whereas a majority of phishing emails get stopped by spam filters and often never reach their intended targets, there is no mainstream mechanism for weeding out 'spam' text messages.
Some mobile malware is programmed to conduct man-in-the-middle attacks, capable of forwarding SMS messages with a user's Mobile Transaction Numbers (mTANs) to an attacker. These mTANs are often used as a way for banking customers to confirm that they initiated a transaction.
By intercepting the code, cyber-criminals can initiate a transaction and then use the unique code to verify the transaction as though they were the legitimate user. Examples of man-in-the-mobile threats have been most commonly found within well known banking Trojans such as Zeus and SpyEye.
Rogue applications are becoming plentiful in most online app stores. Today, Android is the most common platform being exploited by cyber-criminals. Recently, a new Android Trojan was discovered that displays a video downloaded from the net — only if some sensitive information is previously sent to a remote server.
Today, RSA's Anti-Fraud Command Center is witnessing an average of about 3 per cent of all fraudulent transactions originating in mobile channels or devices. While this hardly compares to the percentage of fraud in the online channel, mobile threats continue to emerge and, in time, that number will rise.
Here are some expected mobile threats and developments in the coming year.
Smishing will continue to increase. Many financial institutions have been successful in getting standard phishing attacks under control. However, smishing presents a whole new series of challenges.
Phone flooding services increase in popularity. Out-of-band authentication via SMS or phone call is being used across the financial industry as a step-up authentication method for high-risk transactions.
To overcome this additional security, cyber-criminals flood an intended victim's phone with calls, ultimately rendering the phone useless and interfering with bank's attempt to alert a user to a high risk transaction.
Banking Trojans continue to be developed for mobiles. There have been several attempts at coding SpyEye variants for mobile platforms (mainly Android). These custom codes are designed to attempt intercepting SMS codes sent during transaction authentication by forwarding the content of the text message to the attacker's server.
The code is still young and its presence on mobile phones is limited. However, cyber-criminals are focusing their efforts on the mobile platform.
New Trojan plug-ins are targeting the mobile phone. Many banking Trojans available for sale in the black market offer plug-ins that enable HTML injection. When an infected user attempts to access her online bankingsite, the Trojan automatically injects extra fields in the login page. Most often, the extra details cyber-criminals attempt to obtain are credit card numbers and ATM PIN codes.
Portable nature of mobile devices — and information that is stored or accessed on them — is what makes them so vulnerable (when was the last time you misplaced your desktop?).
Also, if a mobile device is lost or stolen, it is typical for consumers to call their mobile provider to report it, but they don't usually call their bank to report it. If the user engages in mobile banking, all financial information stored on the device could be easily accessed.
Attacks are evolving in the mobile channel and as the popularity of mobile banking grows, financial institutions are challenged with how to translate the success they have had in managing fraud risk in the online channel and applying those same best practices to the mobile channel.
Understanding how to secure your customers against mobile attacks is the first step in turning the tide on fraud — and taking full advantage of the opportunities that this channel presents.
Via : http://aipeup3bbsr.blogspot.in/
Subscribe to:
Posts (Atom)