logo
#

Latest news with #DOB

Chunk of NYC building 175-feet wide falls onto street, injuring 2 girls: officials
Chunk of NYC building 175-feet wide falls onto street, injuring 2 girls: officials

New York Post

time5 days ago

  • New York Post

Chunk of NYC building 175-feet wide falls onto street, injuring 2 girls: officials

A 175-foot chunk of a Queens furniture store building collapsed onto the street below – injuring a pedestrian and two girls inside a parked car, officials said Thursday. The parapet wall of Plaza Furniture and a few neighboring businesses on Jericho Turnpike near 245th Street in Bellerose partially collapsed around 4:30 p.m. with the pedestrian and girls, ages 11 and 13, sustaining minor injuries, according to the NYPD and the city's Department of Buildings. 'I thought a bomb went off, honestly,' witness Victoria Craig told WABC. 'Honest to God. I thought a bomb went off.' 3 The parapet wall supporting businesses on Jericho Turnpike near 245th Street in Bellerose partially collapsed around 4:30 p.m., officials said. Peter Gerber Some debris — including scaffolding surrounding the building — struck a Jeep parked nearby, leaving the 11-year-old rear passenger with back pain and the 13-year-old front seat rider with pain in her right leg, cops said. A 25-year-old man walking by was also struck and suffered back pain, police said. A witness told WCBS that the man managed to crawl his way out from under the debris on his own. 3 Two girls, 11 and 13, were hurt when the debris struck a Jeep where they were passengers, cops said. Peter Gerber 'We just saw that people needed help. I pulled over, and they were trying to move the facade off to make sure there's no one underneath,' witness Jophry Philip said. 'And luckily only one person was underneath. He came out and he was already standing on his own, thank God.' The girls were taken to Cohen Children's Medical Center, where they were listed in stable condition. The pedestrian was taken to North Shore University Hospital in Manhasset, where he too was listed in stable condition, police said. 3 A 25-year-old man suffered back pain after he was struck by the falling debris, cops said. Peter Gerber Responding inspectors from the city's Department of Buildings found that about 175 linear feet of the parapet wall had collapsed onto the sidewalk and street below. Inspectors also issued violations for failure to maintain the building, and ordered the owner to construct a tight board fence in front of a couple properties adjacent to the furniture store 'to protect the public,' the agency said. Partial vacate orders were issued for some of those properties. Inspectors from DOB's Forensic Engineering Unit returned to the scene Thursday to continue the investigation. Any 'enforcement actions' against the 'parties responsible for the collapse' are pending those investigations, the DOB said.

Queens building owner issued violation after facade collapse injures 3
Queens building owner issued violation after facade collapse injures 3

CBS News

time5 days ago

  • CBS News

Queens building owner issued violation after facade collapse injures 3

New York City Department of Buildings inspectors have issued a violation to the owner of a Queens building after a furniture store's facade collapsed in Queens, injuring three people. Residents in the Bellerose neighborhood are in disbelief after the facade collapse on Jericho Turnpike. Some 175 linear feet of the parapet wall came down onto the sidewalk and street below, the DOB said. So far, the cause of the collapse is not known. Inspectors issued what's called an OATH/ECB violation to the property owner for "failure to maintain the building," according to the DOB. They ordered the building owner to construct a tight board fence in front of the property to protect the public. A complaint in June said the building wasn't up to date, and there were holes in the ceiling and floor. It's not clear if that's connected to Wednesday's collapse. "I just opened the store two weeks ago, and this thing happened," Plaza Furniture owner Billy Rashid said. Rashid's facade fell on three people, including two children. Cars parked next to the building were crushed. At least five businesses on Jericho Turnpike between 245th and 246th Streets have been given vacate orders. "I stopped at the light down there, heard a loud boom, I looked behind me all I saw was smoke in the air and people running toward the building," witness Victoria Craig said. The three people hurt in the collapse were hospitalized in stable condition.

Form 26AS Explained: A Must-Have For Hassle-Free ITR Filing
Form 26AS Explained: A Must-Have For Hassle-Free ITR Filing

News18

time18-07-2025

  • Business
  • News18

Form 26AS Explained: A Must-Have For Hassle-Free ITR Filing

A critical financial tool that summarises all the tax deducted on behalf of the taxpayer, the Form 26AS can be downloaded from the Income Tax Department's official website. Form 26AS is a consolidated Annual Information Statement for a particular financial year from the income tax department, mentioning the tax deducted on behalf of the taxpayer. Form 26AS is a critical exemption tool, helping individuals save their net income by providing a detailed account of their tax assessment. This statement helps cross-verify the deductions and refunds due to a salaried individual when they file for the ITR, summarising various details. Apart from the Tax Deducted at Source (TDS) and Tax Collected at Source (TCS), the Form 26AS also contains advance tax/self-assessment tax/regular assessment tax deposited, the refund received during a financial year (if any), details of any Specified Financial Transactions (SFT) (if any), details of tax deducted on sale of immovable property u/s194IA (in case of seller of such property). The form also provides details of any defaults made on TDS, while featuring information related to the demand and refund and details of pending and completed proceedings. Salaried employees check their Form 26AS to verify that the TDS deducted by their employer is correctly deposited and confirm advance or self-assessment tax payments. It helps match the income sources and prevent any tax notice. One can also avoid refund delays that may be caused by the tax credit mismatches. Here is a step-by-step guide on how you can download the Form 26AS: Step 2: Log in to the site's e-filing portal Step 3: Navigate to the 'e-file', followed by the Income Tax Returns and click on View Form 26AS Step 4: Go through the disclaimer. Once you click confirm, you will be redirected to the TDS-CPC Portal. Step 5: Once you enter the TDS-CPC Portal, agree to the acceptance of usage and click 'proceed' Step 6: Click on View Tax Credit (Form 26AS) Step 7: Select the 'Assessment Year' and 'View Type', which could be HTML or text. Step 8: Finally, click on View/Download If your Form 26AS download file is password protected, use your registered date of birth or date of incorporation printed on the Permanent Account Number (PAN) card to open it. The DOB password is to be typed in ddmmyyyy format. If an individual was born on 28th November, 1996, the password will be 28111996. view comments First Published: July 18, 2025, 16:36 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.

The Long Tail Of Identity Theft: What I Learned After Being Doxxed
The Long Tail Of Identity Theft: What I Learned After Being Doxxed

Forbes

time16-07-2025

  • Forbes

The Long Tail Of Identity Theft: What I Learned After Being Doxxed

Fraud case news headline in newspaper I study fraud and cybercrime for a living. Then I became a case study. I've spent years as part of the fraud-fighting community, publishing academic research, sharing insights almost daily on LinkedIn, and speaking at conferences around the country. While much of my work to educate and raise awareness has been embraced, not everyone is a fan. In 2022, after I publicly reported on the alarming rise of check fraud in the U.S. and spoke with several major media outlets, I became a target. The first text message arrived around 7 a.m. I initially dismissed it. But the second message was far more explicit and wasn't just a vague threat—it was personal. My full Social Security number, home address, and a direct warning: 'got your addy, know where all y'all live. stop looking into the check fraud or your credit going low. Screenshots of first (left) and second threatening text messages received on my personal cell Concerned for my safety, my university immediately assigned a campus police officer to accompany me wherever I went. While this measure helped deflect any potential physical threats, something more insidious was already in motion. The same criminal actor who threatened me via text had posted my full identity—name, SSN, DOB, address, even my credit report—to one of the underground fraud forums my team had been monitoring. While this exposure was deeply unsettling, it also presented a rare and valuable opportunity: for the first time, I could observe, up close and in real time, how quickly leaked identity data gets exploited by fraudsters. Why it's So Hard to Link Data Exposure to Fraud Most leaked personal data, whether stolen from breaches, checks, phishing attacks or malware, circulates through opaque and decentralized criminal networks. The data is often sold or shared in encrypted Telegram groups, invite-only forums, or dark web marketplaces with no clear timestamps. Because of this, researchers rarely know when an identity was first listed for sale or accessed by bad actors. On the other end, when that identity is eventually used to commit fraud—say, to open a bank account or apply for credit—it might not be detected for weeks or even months, if at all. Even if you know when an identity was leaked, matching it to a fraud attempt is nearly impossible. Institutions (financial firms, credit bureaus, government agencies, and public databases) operate in silos. There is no centralized system to link the moment of exposure to the moment of exploitation. Without visibility into the dark web and cross-platform monitoring, it's nearly impossible to draw a clear, causal line between when an identity is posted for sale and when it's exploited. To complicate matters further, linking a fraud attempt to a specific leak often requires access to sensitive internal records—such as KYC data or transaction logs—that are protected by privacy laws and corporate policies. The result is a murky, delayed, and ethically constrained landscape, where timelines are incomplete and attribution is uncertain. Unless the identity in question happens to be your own. A Front-Row Seat to Fraud: The First 96 Hours At exactly 9:56 a.m. on March 29, 2022 — minutes after receiving the second threatening message — my personal information was leaked to a Telegram fraud group: full name, address, SSN, date of birth, and even a PDF of my credit report. I began searching online fraud markets to see if my information had been posted. I found it almost immediately. I alerted my identity theft protection provider, then sat and waited. Within a couple of days alerts started arriving. These alerts suggested that by March 30 — less than 24 hours after the leak of my identity — fraudsters had used my identity to attempt to open accounts at multiple financial institutions, as well as pull my credit report. Working with a victim specialist, we carefully reviewed the suspicious activity and flagged each questionable inquiry. In total, 10 alerts arrived within that first day. I also requested my ChexSystems report to track any new bank accounts opened in my name (ChexSystems is a consumer reporting agency that tracks deposit accounts across U.S. financial institutions). When that report arrived, it showed six fraudulent accounts had been opened within four days of the leak. Screenshot of my personal identifiers as appeared on the First Telegram Group Which Shared it. One account in particular stood out: as if to make a point, the fraudsters had gone so far as to mail a debit card linked to one of the fraudulent accounts directly to my home address. The card bore my name and came with a phone number I was supposed to call to activate it. ChecXsystem report of bank accounts created using my stolen identity Debit Card received in my residence as a result of fraudsters using my identity to create a new bank ... More account After the Storm: Analyzing the Long Tail of Identity Exploitation After that first month, things went quiet. The alerts stopped, and I assumed the worst was behind me. I was wrong. Just a few weeks ago, a letter arrived from the Lifeline Support Center in New York. For context, Lifeline is a federal program that provides monthly subsidies for phone or internet services to low-income individuals. According to the letter, someone had used my identity to apply for these benefits, and I was now being asked to upload supporting documents to complete the application. I had never applied for Lifeline. This was a clear signal: my stolen identity was still actively being used, this time to exploit a government assistance program. Realizing I'd grown complacent, I decided to dig deeper—this time using more sophisticated tools and data sources to see what was happening in the background. With access to internal databases from SentiLink, a major identity verification and fraud detection company I work with, I searched for any records of identity theft attempts tied to my name and Social Security number. What I found was eye-opening. In total, there were 5 incidents in March 2022, three in April, two in May, then one in August 2023, and another in April 2024. Zooming out, several patterns in the fraudsters' behavior began to emerge. First, most of the applications used freshly-created email addresses, likely spun up for the express purpose of the fraud, and cycled through different contact details. Across the board, there was a consistent rotation of emails, phone numbers, and physical addresses, likely designed to evade identity verification systems. Interestingly, while some fraudsters used burner phones or untraceable contact information, others left behind real, personally identifiable phone numbers — even as they were in the act of identity theft. Second, the fraud attempts showed how broad and adaptive the strategy had become. My identity had been used to apply for everything from consumer loans and property leases to telecom services, federal benefits, and even a tax-related service. Third, the volume of activity slowed over time. By mid-2022, the pace had noticeably dropped — perhaps due to increased monitoring, the flagging of my data in fraud databases, or simply the reuse value of the leaked information. But in August 2023, a new and unusual application surfaced — one that included a traceable phone number. For the first time, I was able to link the fraud back to a specific individual. The applicant, who appears to live in New Jersey, has a lengthy criminal record, including charges for breaking and entering, assault, and battery. Then, in April 2024, my identity was used yet again, this time in connection with a tax-related service. Specifically, an account was created under my name with a tax preparation service, followed by an attempt to fraudulently file my taxes. Unlike the earlier flurry of activity, this attempt was targeted and seasonal, aligned with tax season, and likely designed to take advantage of high-volume government processing windows. One final and important note from my analysis: it does not appear that any organized fraud ring was behind the continued misuse of my identity. Instead, the pattern suggests individual actors — likely monitoring Telegram fraud channels — picked up my information and incorporated it into their own schemes. My data had become part of a wider fraud supply chain, passed from one bad actor to the next, each adapting it to their own criminal playbook. Most Recent Use of My Stolen Identity with the LifeLine Support Center in NY What This Means for You My experience underscores a sobering reality: once your identity is exposed, you're not a one-time victim. You're probably a long-term asset in a criminal system where your personal data can be recycled, traded, and exploited for years. The fraud may come in waves, or return over time in stealthier, more targeted forms. If this happens to you, here's what I learned the hard way: The initial incident is rarely the end. It's usually just the opening move. In this harsh reality, the most powerful protection isn't just a freeze or a lock — it's awareness and proactivity. Once your information is out there, you're not just guarding against fraud — you're managing an active threat that learns how to adapt. Staying on top of how your identity is being used isn't paranoia, it's a necessity.

UPTAC BTech counselling 2025: Last date to register today, check eligibility and key details here
UPTAC BTech counselling 2025: Last date to register today, check eligibility and key details here

Time of India

time15-07-2025

  • Time of India

UPTAC BTech counselling 2025: Last date to register today, check eligibility and key details here

Dr. A.P.J. Abdul Kalam Technical University (AKTU) will close the registration window today for candidates seeking admission to Bachelor of Technology (BTech) programmes through the Uttar Pradesh Technical Admission Counselling (UPTAC) 2025. Interested students can complete the registration process at the official website — The Uttar Pradesh Technical Admission Counselling (UPTAC) 2025 counselling process for first-year Bachelor of Technology (BTech) admissions will be held in multiple rounds, including both main and special rounds. Steps in the process include choice filling, seat allotment, document verification, and final confirmation of admission by the assigned institution. Candidates applying for Bachelor of Technology (BTech) admission through UPTAC for the 2025–26 academic session must pay a non-refundable registration fee of ₹1,000. This fee applies to both the main and special counselling rounds. How to apply for UPTAC BTech counselling 2025 Follow these steps to register for the UPTAC 2025 for BTech programmes: Step 1: Visit the official website: Step 2: On the homepage, click on 'BTech Counselling 2025' and 'Registration for UPTAC BTech Counselling.' by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like An engineer reveals: One simple trick to get internet without a subscription Techno Mag Learn More Undo Step 3: The link will open a new window where you can begin your application. Step 5: Enter the required details, which include your application number, full name, and date of birth (DOB) in the form. Step 4: Click on the 'Submit' button to move ahead with your registration. Step 5: Pay the registration fee online and download the confirmation page for future reference. UPTAC 2025 BTech eligibility criteria The eligibility criteria vary based on the type BTech programme applied for: Programme Eligibility requirement BTech (Lateral Entry - LE) Diploma holders from a recognised institute with a minimum of 60% aggregate marks (55% for Scheduled Caste/Scheduled Tribe (SC/ST) candidates) are eligible. BTech (Biotechnology - BT) Candidates must have passed Class 12 or equivalent from a recognised board with Physics and Mathematics/Biology as core subjects. BTech (Agriculture - AG) Applicants must have completed Class 12 with Physics, Chemistry, and Agriculture or Agriculture Physics as their main subjects. Documents required for UPTAC 2025 BTech registration To complete their counselling registration, candidates are required to upload scanned copies of the following original documents: • Confirmation page of UPTAC 2025 registration. • Mark sheets and passing certificates of Class 10 and Class 12. • Caste/Category certificate (if applicable for OBC/SC/ST candidates). • Domicile certificate • Character certificate • Transfer certificate (TC) or Migration certificate • Medical fitness certificate • Income certificate (if applying for fee concessions) • Valid photo identification proof (such as Aadhaar Card, Permanent Account Number (PAN) Card, or Passport) • Recent passport-sized photographs TOI Education is on WhatsApp now. Follow us here . Ready to navigate global policies? Secure your overseas future. Get expert guidance now!

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store