logo
#

Latest news with #SMS

Rajasthan Board 10th result 2025: Steps to check RBSE scorecards from DigiLocker and through SMS
Rajasthan Board 10th result 2025: Steps to check RBSE scorecards from DigiLocker and through SMS

Time of India

time15 hours ago

  • General
  • Time of India

Rajasthan Board 10th result 2025: Steps to check RBSE scorecards from DigiLocker and through SMS

The Rajasthan Board of Secondary Education (RBSE) is set to announce the Class 10 examination results for the academic year 2024–25 today, May 28, at 4:30 PM. With nearly 11 lakh students awaiting their scorecards, the board has streamlined digital and alternative access routes to ensure smooth and secure dissemination of results. While students can access their marksheets through the official websites — and — RBSE has also facilitated result retrieval through DigiLocker and SMS, reducing the risk of delays due to server congestion on result day. How to check RBSE Class 10 results via DigiLocker DigiLocker, a flagship initiative under the Digital India programme, enables students to access verified digital documents issued by government institutions. RBSE has uploaded the official scorecards to the DigiLocker platform, allowing students to download them directly. RBSE 10th scorecard via DigiLocker: Steps to access Candidates can follow the steps mentioned here to download the RBSE Class 10th scorecard via DigiLocker: Visit the DigiLocker website: or open the DigiLocker mobile app. Login using your mobile number registered with the CBSE or state board systems. First-time users must complete a quick registration process. Navigate to the 'Education' section on the homepage. Select 'Rajasthan Board of Secondary Education' from the list of available education boards. Choose 'Class 10 Marksheet 2025' and enter your roll number and other required credentials. Click on 'Download' to save your digital marksheet. Students are advised to ensure accuracy in login details and roll numbers to avoid retrieval issues. The digital scorecard downloaded from DigiLocker holds the same validity as the physical copy. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Secure Your Child's Future with Strong English Fluency Planet Spark Learn More Undo How to check RBSE Class 10 results via SMS For students in remote regions or facing connectivity issues, RBSE has enabled an SMS-based service to receive Class 10 results instantly. This method helps eliminate dependency on internet bandwidth or overloaded websites. Steps to receive RBSE 10th result via SMS Open the SMS application on your mobile phone. Type the message in the format: RJ10 ROLL NUMBER (For example: RJ10 1234567) Send the message to the official number designated by RBSE (to be updated by the board during result declaration). Within minutes, you will receive an SMS with your result details, including subject-wise marks and pass/fail status. Ready to empower your child for the AI era? Join our program now! Hurry, only a few seats left.

Beware texts asking for personal details
Beware texts asking for personal details

The Star

timea day ago

  • The Star

Beware texts asking for personal details

KLANG: Any short messaging service (SMS) content that includes hyperlinks, callback numbers or requests for personal information is likely to be from scammers rather than legitimate sources. According to a source involved in network security, the Malaysian Communication and Multimedia Commission (MCMC) issued a statement last year regarding this matter. He noted that the MCMC had announced that, as of September 2024, the sending of hyperlinks, callback numbers and requests for personal information via SMS would be prohibited. This directive had been communicated to all telecommunication companies, he added. However, the source, who wished to remain anonymous, noted that the MCMC faced several additional challenges, especially regarding Internet messaging services such as Google's Rich Communication Services (RCS) and Apple's iMessage. Both of these services are integrated within the SMS application. Consequently, if there is a message icon displayed on the phone, it allows users to receive RCS and iMessage as well. 'I believe both Google and Apple have not 'ingested' the rules issued by the MCMC,' he said. He said the MCMC seems determined to enforce the prohibition ruling on both platforms, given that many had become victims of scams after receiving bogus messages, including those allegedly from the government. In addition to these, there were other conduits that facilitated scams, including fake base stations, commonly referred to as rogue base stations or Stingrays. 'Phones try to connect to the strongest signals available, and hence, if there is a fake base station with a strong signal, phones will try connecting to it. 'Once connected to the fake base station, scammers operating these bogus transmission stations can send out SMSes that contain hyperlinks and other banned content. 'They can also craft the messages into whatever they want them to be,'' he explained. The expert noted that the MCMC is collaborating with telecommunications companies to combat these issues as part of their efforts to eliminate scamming platforms. To make matters worse, conmen were also spoofing the numbers of telecommunications account holders and using them to perpetrate scams by generating what is referred to as 'boomerang traffic'. 'International calls come in and connect to the telcos here through local numbers. 'To curb this, a repository must be created to ensure that when calls from local numbers come from overseas, the caller is indeed overseas and the calls are not coming from spoofed local numbers,' he added. He explained that when mobile phone users travel overseas, their numbers must go into the repository, as they would be expected to call home from wherever they are. 'But if the account holders are in Malaysia and not overseas, and if calls are being made from their numbers but originating from overseas, the repository should reject those calls,' he said, noting that he is aware the MCMC is also pushing for this aspect. He said the onus must also be on members of the public to be cautious and immediately delete SMSes that come with hyperlinks seeking personal information as well as with callback numbers. 'They are from scammers and not from any legitimate source,' he added.

What Fleets Need to Know About FMCSA Compliance Reviews in 2025
What Fleets Need to Know About FMCSA Compliance Reviews in 2025

Yahoo

time6 days ago

  • Automotive
  • Yahoo

What Fleets Need to Know About FMCSA Compliance Reviews in 2025

Ask any fleet manager or consultant, and they'll tell you that when the Federal Motor Carrier Safety Administration initiates a compliance review, it's a full-body scan of your operation that starts long before the auditor walks through your door. In most cases, you'll get a notice via email or mail that your company has been selected for a compliance review (CR). This could stem from a poor Inspection Selection System score, a recent crash, BASIC alerts in the Safety Measurement System (SMS), a failed new entrant audit, or even a complaint from the public or law enforcement. Once that notice hits your inbox, the countdown begins. Understanding the FMCSA Ratings Every compliance review results in one of three possible safety ratings:Satisfactory: You've met the minimum FMCSR requirements. You can keep operating without restrictions. Conditional: You have compliance problems that must be addressed. Your rating is a red flag for brokers, insurers and shippers. Unsatisfactory: You're shut down. Operations must cease until you file a corrective action and successfully upgrade your rating. What causes a carrier to drop from satisfactory to conditional or unsatisfactory? It often depends on how you perform in each of the seven BASIC categories, and whether you've fixed repeat violations or shown a pattern of neglect. A Deep Dive Into The BASICs of Safety Here's where it gets real. FMCSA evaluates your safety posture based on your scores across seven Behavior Analysis and Safety Improvement Categories (BASICs). Each one has thresholds that vary based on carrier type and fleet size. Violations here can cause enforcement action, audit prioritization and score inflation. Unsafe Driving: Think speeding, texting and improper lane changes. One egregious moving violation can tank your scores, especially for small fleets. The threshold varies by vehicle type but generally sits around the 65th percentile for most motor carriers and the 50th percentile for passenger carriers. Hours-of-Service Compliance Violations include falsified logs, exceeding drive time or failing to use a registered ELD. This BASIC is double-weighted, meaning it counts more toward your overall safety score. ELD data and logbooks are scrutinized heavily during audits. Driver Fitness: This isn't about gym memberships. It's about proper licensing, expired medical cards or operating without the appropriate endorsement. FMCSA and auditors want to know if this driver qualifies for that seat. Controlled Substances/Alcohol: Violations here can come from DOT tests, missed randoms or post-accident results. The Motor Carrier Management Information System (MCMIS) and Drug & Alcohol Clearinghouse are both sources FMCSA checks during reviews. Vehicle Maintenance: Inspection reports, driver vehicle inspection reports (DVIRs) and maintenance files matter. Repeated out-of-service violations for brakes, tires or lighting are audit red flags. If your trucks are falling apart on the road, expect scrutiny here. Hazardous Materials Compliance. This category is loaded with regulatory land mines for those who haul placardable loads. Training records, shipping papers and vehicle placarding are all examined during a CR. Crash Indicator: This is based on police-reported crashes involving your vehicles. While not directly linked to fault, patterns of crash involvement signal risk to regulators and insurers. FMCSA's Proposed Changes to BASICsFMCSA has proposed a long-overdue overhaul to the BASICs scoring system under its Compliance, Safety, Accountability (CSA) program, something that's been criticized for years as inconsistent and out of touch. The new plan doesn't eliminate safety categories; it reshuffles and refocuses them. What's shifting: 1. Drug & Alcohol BASIC Merged into Driver Fitness Under the current CSA system, drug and alcohol violations live in their category. In the proposed changes, those violations, including failed drug tests, refusals or 49 CFR Part 382 violations, will be rolled into Driver Fitness. Why? Because FMCSA sees substance-related issues as directly tied to whether a driver is 'fit' to operate a CMV. Why it matters: Driver Fitness will no longer be just about medical cards and CDL status; it'll now reflect the driver's complete qualification picture, including sobriety. That means one positive drug test could not only hit your Clearinghouse and DACH reports, but it could also tank your Driver Fitness BASIC and potentially ripple across your entire safety profile. 2. Maintenance BASIC Split: Vehicle vs. Driver Responsibility Another major update: the Vehicle Maintenance BASIC will be divided into two categories: Vehicle Maintenance: Driver-Observed. Think lighting, flat tires, cracked windshields, which drivers must catch during pre-trip inspections and log via DVIRs. Vehicle Maintenance: Carrier-Observed. This includes brake adjustments, steering components and frame integrity, which require a shop or a qualified mechanic to detect and repair. Why it matters: For years, fleets have been held accountable for everything, even if it was something a driver ignored or failed to report. By splitting this BASIC, FMCSA finally distinguishes between what the driver missed and what the fleet failed to maintain. That means your maintenance record won't get torched if your driver skips a pre-trip and rolls out with a busted Happens During a Compliance Review? Here's the basic flow of an FMCSA compliance review: Notice and Scheduling: FMCSA or a state partner notifies you. You may be offered an off-site, on-site or focused review. Initial Interview: The investigator interviews the safety director (or owner, for small fleets) and reviews procedures, policies and organizational structure. Document Review: Auditors will ask for: Driver list with CDLs, medical cards and DQ files. Vehicle list with registration and inspection records. HOS records and electronic logging device logs. DVIRs and maintenance records. Proof of insurance (Form MCS-90). Accident register. Drug and alcohol testing records and MIS data. Violation Analysis: They compare your records to MCMIS, SMS and other systems. Discrepancies, like unreported positive drug tests or unqualified drivers, trigger enforcement. Final Interview and Outcome: FMCSA issues a written report and safety rating. If your rating is 'conditional' or 'unsatisfactory,' the agency may also issue civil penalties or require a Safety Management Plan (SMP). How FMCSA Scores Can Hurt (or Help) Your Business The ripple effects of a bad rating are brutal: Higher Insurance Premiums. Many insurers will not touch carriers with conditional ratings, or they will raise rates significantly. Lost Freight Opportunities. Brokers and shippers, check your SMS profile. If your scores are high or show alerts, they may avoid working with you. Recruiting Struggles. Good drivers want to work for safe, stable fleets. If your rating drops, so does your appeal. Audit Frequency. Carriers in alert status are targeted more often for audits and roadside inspections. How to Stay Prepared The best way to survive an audit is to treat every day like you're already being audited. Here's what that means: Track Everything: Use fleet management systems like Motive, Fleetio or Tenstreet to track DQ files, ELD logs and DVIRs in one place. Review Weekly: Don't wait for the end of the quarter. Check logs, driver credentials and maintenance files every week. File Cleanly: Organize DQ files with digital checklists. Missing a single document, like a CDL copy or motor vehicle record, can trigger citations. Self-Audit: Run mock audits quarterly. Motive, Tenstreet, Trucksafe and independent consultants can all help. Data Qs, SMPs and Rating Upgrades Got hit with a bad violation that you can prove was incorrect? Use the Data Q system to challenge it. Are you stuck with a conditional or unsatisfactory rating? You'll need an SMP and a formal request for a rating upgrade. These require detailed corrective actions, implementation dates and supporting documentation. Don't go it alone. A bad SMP will be denied. Compliance attorneys (like Childress Law) or consultants familiar with the FMCSA process (like Trucksafe) can guide you step by step. Proactive Compliance is the Only Insurance Compliance is about building and maintaining defensible programs that lead to operational and financial survival. Understanding how the FMCSA views your fleet, staying on top of documentation and using tech tools to manage your records can mean the difference between growth and shutdown. An audit is just a snapshot. The real story is how you operate day in and day out. The post What Fleets Need to Know About FMCSA Compliance Reviews in 2025 appeared first on FreightWaves.

Consumer court orders bank to refund Rs 2.4L lost to online fraud due to KYC breach
Consumer court orders bank to refund Rs 2.4L lost to online fraud due to KYC breach

Time of India

time20-05-2025

  • Business
  • Time of India

Consumer court orders bank to refund Rs 2.4L lost to online fraud due to KYC breach

Dehradun: A consumer court has ordered a private bank to refund Rs 2.4 lakh to a customer after finding that its failure to complete KYC checks allowed fraudsters to siphon off funds from his account in an online scam in 2016. The court also directed ICICI Bank 's branch on Rajpur Road to pay Rs 25,000 in compensation and litigation costs. Merchant navy officer Ashutosh Vijan had filed a complaint with the Dehradun district consumer commission after his NRI account was compromised in an online fraud . On March 3, 2016, Vijan received an SMS about a debit of Rs 1 lakh from the account. He rushed to the bank but before he arrived, he received more transaction alerts. At the branch, officials blocked his account and initiated action to recover Rs 5 lakh that had been transferred to other accounts. The bank assured Vijan that the full amount would be restored within 30 to 45 days. However, the refund never came and Vijan returned to duty on his ship. After 10 months of inaction, Vijan approached the consumer commission. He said the bank failed to carry out KYC on the accounts where his money was transferred. He also flagged the lack of a mandatory 30-minute gap between four back-to-back transactions totalling Rs 5 lakh, which were executed within 13 minutes. The commission reviewed the documents and upheld Vijan's claims. It noted the absence of an internal investigation report from a senior official. It was found that all four beneficiary accounts were forged and had not undergone any KYC checks. Vijan said the bank refunded only Rs 2.6 lakh, while the remaining Rs 2.4 lakh was never returned. The commission ordered the bank to repay the outstanding amount with 7% interest per annum from the date of the complaint. It also directed the bank to pay Rs 20,000 in penalty and Rs 5,000 towards litigation costs.

Android scam lets hackers use your credit card remotely
Android scam lets hackers use your credit card remotely

Fox News

time20-05-2025

  • Fox News

Android scam lets hackers use your credit card remotely

Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN. The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card. Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. The fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust. Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card. Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker. Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. 1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts. 3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you'll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers. 4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it's possible your banking details are already compromised. That's why it's important to regularly check your transaction history for anything odd, like a small payment you don't remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It's also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues. 5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they'll try again, especially if your personal details (like your phone number, address or email) are easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 6) Contact your bank and freeze your cards: If you think you've tapped or handled a suspicious card, or if your phone acted strangely afterward, don't brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name. 7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. 8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI's Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure. The SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies. Do you think Google is doing enough to protect you from malware? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store