Skip to main content

All About UPI

UPI stands for Unified Payments Interface. It is a payment mode developed by the National Payments Corporation of India. UPI is a payment system that allows you to transfer money between any two parties. As compared to NEFT, RTGS, and IMPS, UPI is far more well-defined and standardized across banks. This means that you can use UPI to initiate a bank transfer from anywhere in just a few clicks! The benefit of using UPI is that it allows you to pay directly from your bank account. The hassle or need to type in the card or bank details goes away with UPI. You can use UPI to transfer money to your family, friends, or even between your own bank accounts. The much wider use of UPI comes when you have to pay different merchants. mPIN in UPI Another benefit of using UPI is that you can do away with the need to wait for an OTP and enter it to complete the money transfer. The mPIN is a 6-digit passcode that you must enter every time you need to make a transaction. The mPIN is highly val

What is Pegasus?

The Pegasus spyware, developed by Israeli software company NSO Group, has targeted globally more than 50,000 phone numbers, including 300 in India, for surveillance 


Notes

  • What is it?
  • How does it work?
  • What can it do?
  • A brief history of Pegasus


The Pegasus Project, an investigation by an international media consortium, has revealed that more than 50,000 phone numbers were targeted by spyware created by NSO Group, an Israeli software company. On the list were 300 verified phone numbers in India, including those of ministers, opposition leaders, a sitting judge, more than 40 journalists, and several activists and business persons.

But what is Pegasus, who is it for, how does it infect devices, and what can it do?

What is it?

Spyware is any malicious software designed to enter your computer device, gather your data, and forward it to a third party without your consent.

Pegasus, developed by NSO Group, is perhaps the most powerful spyware ever created. It is designed to infiltrate smartphones — Android and iOS — and turn them into surveillance devices.

The Israeli company, however, markets it as a tool to track criminals and terrorists — for targeted spying and not mass surveillance. NSO Group sells the software to governments only. A single license, which can be used to infect several smartphones, can cost up to Rs 70 lakh. According to a 2016 price list, NSO Group charged its customers $650,000 to infiltrate 10 devices, plus an installation fee of $500,000.

How does it work?

Pegasus exploits undiscovered vulnerabilities, or bugs, in Android and iOS. This means a phone could be infected even if it has the latest security patch installed.

A previous version of the spyware — from 2016 — infected smartphones using a technique called “spear-fishing”: text messages or emails containing a malicious link were sent to the target. It depended on the target clicking the link—a requirement that was done away with in subsequent versions.

By 2019, Pegasus could infiltrate a device with a missed call on WhatsApp and could even delete the record of this missed call, making it impossible for the user to know they had been targeted. In May that year, WhatsApp said Pegasus had exploited a bug in its code to infect more than 1,400 Android phones and iPhones this way, including those of government officials, journalists, and human rights activists. It soon fixed the bug.

Pegasus also exploits bugs in iMessage, giving it backdoor access to millions of iPhones. The spyware can also be installed over a wireless transceiver (radio transmitter and receiver) located near a target.

What can it do?

Once installed on a phone, Pegasus can intercept and steal more or less any information on it, including SMSes, contacts, call history, calendars, emails, and browsing histories. It can use your phone’s microphone to record calls and other conversations, secretly film you with its camera, or track you with GPS.

A brief history of Pegasus

2016:

Researchers at Canadian cybersecurity organization The Citizen Lab first encountered Pegasus on a smartphone of human rights activist Ahmed Mansoor.

September 2018:

The Citizen Lab published a report that identified 45 countries in which Pegasus was being used. As with the latest revelations, the list included India.

October 2019:

WhatsApp revealed that journalists and human rights activists in India had been targets of surveillance by operators using Pegasus.

July 2021:

The Pegasus Project, an international investigative journalism effort, revealed that various governments used the software to spy on government officials, opposition politicians, journalists, activists, and many others. It said the Indian government used it to spy on around 300 people between 2017 & 2019.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

*JOIN ME ON SOCIAL MEDIA* 
📌YouTube: https://www.youtube.com/channel/UCkdR...

📌Facebook:

📌Instagram:

📌Telegram: https://t.me/unboxingspace

📍Website: https://unboxingspace21.blogspot.com

••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••

I hope this video was Useful and you liked it if you did press the thumbs up button. & Subscribe to our Channel.

Thank you. Team US :) 

••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••

E-mail us for Business & Promotion on: unboxingspace2020@gmail.com

••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••

This channel is Managed by: INFINITYgroupDM: https://bit.ly/InfinitygroupDM

===========================================================================

Credits:-

Team Pixel Creation (video production): http://bit.ly/3c2FB9d

Branding Center (graphics): http://bit.ly/3wENlWW

DOP(Shivraj Patil): http://bit.ly/3wJz6A5

Online Space (Script): https://bit.ly/2RW2pRe


All content is Copyright ©️ to Unboxing Space.

••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••

Comments

Popular posts from this blog

All About Web 3.0

Article Duration: 15 min Now you can listen to this article via Spotify click on the player below: Imagine a new type of internet that not only accurately interprets what you input, but actually understands everything you convey, whether through text, voice, or other media, one where all content you consume is more tailored to you than ever before. We are at the tipping point of a new phase in the web’s evolution. Some early pioneers call it Web 3.0. Arguably, there are a few early-stage Web 3.0 applications that already exist today, but until the new internet becomes fully embedded in the web infrastructure, their true potential cannot be observed. Definition: What Is Web 3.0? Web 3.0 is the upcoming third generation of the internet where websites and apps will be able to process information in a smart human-like way through technologies like machine learning (ML), Big Data, decentralized ledger technology (DLT), etc. Web 3.0 was originally called the Semantic Web by World Wide Web in

Zero-day vulnerability: What it is, and how it works

A zero-day exploit is when hackers take advantage of a software security flaw to perform a cyberattack. And that security flaw is only known to hackers, meaning. Software developers have no clue about its existence and have no patch to fix it. This is why, when a zero-day attack is detected, it needs to be mitigated immediately. In other words, there are “zero days” to fix vulnerability because it’s already been exploited. Here, we’re zeroing in on the zero-day concept, including just what is a zero-day exploit, and how to avoid them. 1. Zero-day definitions: What is zero-day? The term “zero-day” refers to a newly discovered software vulnerability and the fact that developers have zero days to fix the problem because it has been — and has the potential to be — exploited by hackers. Sometimes written as 0-day, zero-day definitions run the gamut: A zero-day vulnerability , also known as a zero-day threat, is a flaw in security software that’s unknown to someone interested in mitig

15+1 Ways to Hack-Proof your Smartphone

If you’re wondering “how to block hackers from my phone,” or what you’ve come to the right place. In this article, we’ll cover seven easy-to-follow tips that will help you to protect your phone from hackers. Key Notes Keep up to date – and don’t open up holes yourself. Be careful of what you install. Review what’s already on your phone. Make it hard for intruders to get in. Be prepared to track and lock your phone. Don’t leave online services unlocked. Adopt an alter ego. Beware of open wifi. Lock individual apps. Get a warning when your phone goes walkies. Keep an eye on things behind the scenes. Keep Your Tracking and Remote Locking Settings On. Install Security Software Tools on Your Mobile Device. Be Judicious About What You Download and Install on Your Phone. Protect Yourself from SIM Swapping. Additional Tips on How to Protect Your Phone from Hackers. 1. Keep up to date – and don’t open up holes yourself: When it comes to protecting yourself against hackers, step one is always to