Mumbai based Startup CoutLoot gets $40,000 worth Credits from FBStart

Mumbai based Startup CoutLoot, an end-to-end fashion recommerce platform, has received $40,000 worth of credits and services from Facebook’s developer focused “FbStart” programme.

It’s important here to not that it’s ‘in the form of credits and services’ not real money funding. The Mumbai based startup has been selected for this funding.

About FbStat programme for Start-ups with potential

Launched last year, “FbStart” helps founders grow their Startups by providing them assistance on the developer side of the Business. That’s a Starup selected under the FbStart programme will get credits and services to spend on the paid services Facebook provides to businesses. In addition,  the selected startup also gets opportunities to engage with the Facebook team, receive mentoring from Menlo Park headquartered tech giant’s engineering teams.

With the recent Credits and Services funding Mumbai based Startup CoutLoot will be able to make use of the services the credits can buy. It also gives them privileges as defined in the deal between Coutloot and Facebook.

CoutLoot gets added to Facebook’s Start-up Nursery

For cash rich or giants in the tech World, the programme’s such FbStart act as a nursery to help potential blossom. The idea is to acquire them when in future, if they seem a good buy.

It’s an opportunity for Jasmeet Thind, Cofounder, CoutLoot, to make something good of CoutLoot. The startup will get a chance to get access to the exclusive community of Facebook’s developers and worldwide events. Which in essense means more networking opportunities outside India and within proper tech circles.

The programme provides free access to more than 25 services including open source tools like React Native, FB Login and Account Kit and App Analytics. Notably similar startup programs which will tend as a nursery bed for future businesses or business ideas have been launched by Google, Apple etc.

Cube26 Brings intelligent SMS Filtering, Music, Camera to Karbonn Mobiles

Karbonn Mobiles has signed a deal with Start-up Cube26, an AI tech startup to enrich its smartphones with safer and intelligent smartphone applications and suites.

new Karbonn smartphone series will be enriched by Cube26 Reos suite of apps. Cube26 Brings intelligent SMS Filtering for intelligent sms filtering, music app with audio recognition and camera with premium featuresCube26 is an India based technology innovation focused company. If I can recall correctly Cube26 started 3-4 years ago as a mobiles and games app development company. Later it transitioned to offering intelligent solutions to OEMs. At present it’s known as an AI technology startup.

With the collaboration, Karbonn Mobiles, India’s leading handset maker, will introduce Reos suite of native apps in its new range of smartphones.

What new Cube26 brings to new Karbonn smartphone series

The new Karbonn smartphone series will be enriched by Reos suite of super apps. The new smartphone range will come integrated with these apps for message, music and camera, aimed at enhancing the user experience, said Sudhir Hasija, Chairman at Karbonn Mobiles.

Reos suite of apps from Cube26 brings intelligent SMS Filtering, Music, Camera Experience

  • In the past couple of years, the Indian smartphones experience is plagued by rising numbers of promotional SMSes. Most of the times unsolicited and spam.

Reos Message uses Cube26’s proprietary spam filtering technology, which claims to filter 97% of the spam messages giving user a clean SMS experience.

Other than filtering promotional messages, it also categories all the SMS into three major categories – Main, Notifications and Promotional.

Also Available at: Visit Google Play and look for Reos Message – Spam Free SMS .

  • Reos music app aggregates all the capabilities of a native music player with additional features for online video content, radio and shazam like audio recognition technology.

What is Shazam like audio recognition technology? … Say you heard some song a couple of times. But unfortunately not the full song but just 20 seconds of it. So all you can do is natter a 20 seconds of it with lyrics. Shazam’s audio recognition and search,  will try to search for the song using that piece. I’ve not used it, hence I can only hope it works with your nattering as well. Hence, using Shazam like technology Reos music app is powered by a search engine which helps users to fast search and get all relevant information about songs across the web.

Also Available at: Visit Google Play and look for Reos Music: MP3, Video & Radio .

  • Reos camera app brings many premium smartphones features to Karbonn smartphones. It brings Prisma like artistic filter, time lapse, slow motion, beauty filter. Artistic filter is powered by Deep learning technology – one of the most advanced AI technology available today, said Saurav Kumar, Cofounder & CEO of Cube26.

Also Available at: Visit Google Play and look for Reos Camera: Art & Beauty .

To conclude, Cube26 has recently received a major funding from Tiger Global VC.

4 Ways to Change ICICI Credit or Debit Card PIN instantly

If you have an ICICI Debit card or credit card and use it regularly on ATMs, online or other Points of Sale (in restaurant, shopping malls or any other shop), then it’s advisable to change your debit or credit card PIN regularly. Changing or generating a new PIN for your ICICI Credit or Debit card INSTANTLY is not very difficult. Depending on your ease with communication and technology, you can choose any one of the 4 ways given below to change ICICI Credit or Debit Card PIN instantly.

4 Ways to Generate/Change ICICI Credit or Debit Card PIN instantly

4 Ways to Generate ICICI Credit or Debit Card PIN instantly OR Change ICICI Credit or Debit Card PIN instantly

NOTE : Visiting your nearest ICICI Bank ATM to change ICICI Debit Card PIN instantly is pretty easy. The screen will easily guide you through.

NOTE: You can also call ICICI Customer Care (IVRS) and follow the instructions. You can find it in the information booklets you received with your account or online. Keep your details handy, as the operator on the other side of the phone will ask you to furnish those as a security measure.

NOTE: Search for ICICI on your Web browser. Choose the correct ICICI website from the search results. Once you’re logged in and reach Dashboard, you can see “My Card PIN” on Top of the Left sidebar. Click on it and Follow instructions.

NOTE: To use Mobile App to change your ICICI Debit or credit card PIN instantly, you will first need to install Official ICICI mobile app on your Mobile device.

The above ‘How to’ steps are for ICICI debit and credit cards. But every bank offers multiple ways to change ICICI Credit or Debit Card PIN instantly

 

4 Ways your Debit Card Information can be Stolen and Safety Tips

The objective of sharing the ways your Debit Card information can be stolen is just to make you more aware. Over all, you must not worry too much as your debit cards are as secure as ever.

Last week one particular news rattled the debit card holders in India. According to various news reports online and Offline, around 32 Lakh Debit Cards have been compromised in the month of May-June this year. In India alone 6 Lakh debit cards were said to have been compromised or hacked (sensitive and personal bank details were stolen). The Debit card users most affected by the said attack belonged to SBI, HDFC bank, ICICI, YES bank and Axis Bank. The reports were enough to make some among us afraid of using our ATM cards on ATM Kiosks installed across India. The more vgilant Indians are also thinking twice before using their credit and debit cards online. To what an extent this fear is reasonable? We will delve into it and share with you 4 ways through which your debit Card Information can be Stolen.

There are multiple ways in which your Debit Card information can be stolen. But they can broadly grouped under 4 caps. Below are 4 ways your Debit Card Information can be Stolen, along with the Safety tips:

1. Phishing : You receive fraudulent emails purporting to be from reputable companies or your bank. In reality the emails are from fraudsters. The idea is to induce the receivers of such emails reveal their personal information, such as passwords, Card PIN and credit card details, bank details to the fraudsters.

Safety Tip: Always remember that NO BANK asks for such information via email or phone call.

Safety Tip: Know the online address of you Bank. For instance, IDBI bank’s online address is http://www.idbi.com/index.asp . Trash any email whose sender is xyz@gmail.com or xyz@idbi.in. In simple, the official email from IDBI will always be from an email account which ends in idbi.com. A good way to reach at your bank’s site, for online banking is to write the name of your bank in the address bar. The moment you will hit the enter key, you will automatically be shown search results, and your bank’s site will be the top search result.

Safety Tip: Remember that every online address of your bank will have the same TLD, that if it’s IDBI, then irrespective of URL or link, it will have idbi.com.

Safety Tip: The moment the bank website enters into sensitive information area it starts using https:// and NOT http:// . All Payment gateways use https//: .

2. Skimming Devices : Skimming attacks also aim your debit card information. They are usually effected by very tiny skimming devices, which can be easily attached to an ATM Machine. The ATM data skimming devices are sometimes so tiny that they are not detectable by surveillance or CCTV Cameras.

3. Compromising the Security of a Payment Processor

       A. Malware/Virus Attack

  • ATM Malware

Safety Tip: Use your debit card at ATMs which are very active and are not on desolate places. Do NOT make a transaction at an ATM Kiosk where there is no Security Guard.

  • POS MalwareTrojan/Keylogger etc. — Point of Sale malware, as the name suggests is malicious code which can be installed on any device where retail transaction is carried out. The POS systems can be as public as a debit/credit card reader in a shop or restaurant, to as personal as your mobile phone or your PC. A malicious POS device such as a Credit card reader or debit card reader can be installed with a malware, which may be reading your card twice, that’s not only the magnetic stripe but also the Card number. A Mobile device your PC can also be POS.

Key Loggers are malware which can installed on any device without you knowing it. The Key Loggers, as the name suggests, steal your information by recording your Key strokes on keypad or Keyboard.

Safety Tip: According to RBI Guidelines, the Banks are issuing new Debit cards with EMV Chips (small stamp sized circuit on the face of your Card).

Safety Tip: Use a Licensed Anti-Virus with Internet security suite, for PC or mobile device. This is important as with the increase in Online Shopping, you will be using your PC or mobile devices to make purchases.

B. Hacking Attacks

Safety Tip: As far as you’re concerned shop from reputed e-commerce sites. If you don’t know the reputation of site don’t make a purchase there.

Safety Tip: Contrary to common knowledge, Bank Information hacking or debit card hacking does not have just the technology or machine dimension to it. It has a necessary human element to a great degree.

For instance, a real human being can call you and can tell you as to how your such and such amount bonus us stalled, simply because you’re not furnishing them any information. NEVER DISCLOSE (tell) your sensitive bank details to any one, no matter how realistic the caller may appear to you. NOTE THAT YOUR BANK WILL NEVER ASK FOR YOUR DEBIT CARD NUMBER, DEBIT CARD PIN OR YOUR ASK YOU TO FURNISH YOUR BANK ACCOUNT DETAILS BY CALLING YOU (on phone). Bank don’t trust humans even who are in their employment to reveal to you such information. IF THERE’S SOMETHING URGENT YOU WILL BE ASKED TO VISIT YOUR NEAREST BRANCH. It’s good to understand that even the Card PIN which your receive by mail, is not sent you by any human being employed at Bank. The PIN is securely generated by some machine.

4. Remain Vigilant and Aware : The recent compromise of Debit Cards MUST NOT make you all frenzied up. Although there are certain DOs which you must always remember and practice while using your debit card, such as not making a transaction in an ATM Kiosk where there is no Security Guard OR no Surveillance Camera. OR making online transactions only at reputed e-commerce websites.

Thing you must know: Many a times websites such as this one, shares with you some product such as book or a game, which you can buy online. We are NOT POINT OF SALE. We are simply sending you to the website where you can make the purchase. We always send our readers to secure sites with reputation such as Amazon, Flipkart or Snapdeal etc.(Secure sites are those with https://). if you don’t want to use your Debit or Credit card even at these sites, then you can always opt for Cash on Delivery Option. That’s you can pay when you take the delivery of the Product ordered.


 

That said, when it comes to secure-ness of Debit Cards then the recent compromise of debit cards doesn’t tell the correct picture. Debit Cards are still very secured and you must not worry about hacked ATM machines.

The same applies to online transactions made through cards. Even when a user doesn’t take the above simple precautions, the Payment gateways used by all banks are so secure that it’s nearly impossible to hack them.

Banks these days use double or triple or multiple authentication (such as user id, Transaction password or OTP sent to your verified email address or Mobile phone number) to ensure that the actual owner of the bank account or debit card is making the purchase. Hence, don’t worry. Your bank will not pay anyone any money or debit your account, unless it’s more than 100 percent sure that you are the one who’s making the purchase.

It’s always good to have a good Licensed anti-virus along with internet security, such as eScan, installed on your PC. Particularly when you use your credit or debit card to shop online. But that doesn’t mean your debit card is at risk, if you buy something online from a PC which is not properly secured. The Banking websites and the payments gateways are so sophisticated these days that the moment the bank or Payment gateway suspect something, it will abort the transaction at that point.

Safety Tip: It’s a good idea NOT to use Public WiFis and Public PCs to make online purchases.

To conclude, we shared much about things you must do to remain safe while using your Debit Cards or cards. OR while using an ATM. But the cashless banking transactions gateways are so robust that they are very safe. Hence we must not worry too much.

Is my Website Mobile friendly? | Mobile Friendliness Tool

As you know more and more people are using their mobile devices such as smartphones and tablets to surf online. This means that the online traffic is increasingly moving towards mobile website mobile friendlydevices. In such a scenario it’s important for any blogger or website owner ensure that its website shows properly on a mobile device. Failing which would mean decrease in revenue and traffic. So do you ask yourself: Is my Website Mobile friendly? You should.

Google, the biggest search engine in the World wants you to make your blog or website mobile friendly. That’s why it offers a free of cost tool, to test whether your website or blog is mobile friendly or not.

Want to check your website’s mobile friendliness? then, Click Here To Test

How To Spot Promoted Trend in Twitter Trending Topics | Twitter

One of Twitter’s paid products is is Promoted Trends. How to spot Promoted Trend in Twitter Trending Topics …?

Spot Promoted Trend in Twitter Trending TopicsA promoted trend features in the Trending Topics on the Left of Twitter Dashboard. The hashtag chosen by the brand using this promoted trend appears at the top of trending topics for a fixed number of hours. While most hashtags are dynamic (change their position on the List with increase or decrease in popularity), the promoted hashtag is static. That’s it is not affected by the change in opinion or something else catching the Twitter users attention. Hence a promoted trend always appears on top, for the promotion period.

Another way to spot the promoted trend is that irrespective of the position it stands after the promotion, it’s the only, which has the number of tweets mentioned besides it.

You need at least a Lakh of Rupees to trend a topic for a couple of hours.

Dual-Sim 4G Budget smartphone unveiled | iBall Andi 5G Blink

Hours back, iBall unveiled in India its 4G Budget smartphone : Andi 5G Blink.

Andi 5G Blink is a dual-SIM device which supports 4G LTE (Indian bands) on both slots. The device doesn’t support VoLTE. A couple of days back Reliance launched VoLTE smartphone at Rs 20,000, which means you can make voice calls on 4G.

A Quick look at Andi 5G Blink 4G Budget smartphone specs:

  • 5-inch FWVGA IPS panel with a resolution of 480×854
  • Powered by 1GHz quad-core processor
  • 1GB of RAM
  • 8GB of internal storage, which can be extended via microSD card up to 32GB.
  • 5MP autofocus rear camera with LED flash
  • 2MP selfie camera with LED flash
  • Runs on Android 6.0 Marshmallow
  • 2300mAh battery

iBall Andi 5G Blink Price and Availability: Rs 6,299

The 4G budget smartphone will go live on sale through authorized offline retail chains across the country. The launch date not announced yet.

LYF Earth 2 smartphone with Voice Control,Retina Scan unveiled

Reliance Retail yesterday unveiled the LYF Earth 2 — the second LYF brand.

The key features of LYF Earth 2 are:

  • Retina-based unlock
  • Faster fingerprint sensor
  • Has sensors that enable the user to assign unique fingerprints to jump-start any three applications with just a touch on the lock screen.
  • Allows the user to encrypt photos and videos stored in the gallery to protect them from hackers.
  • Provides safeguard to personal data by encrypting various social media applications.
  • Voice-controlled camera

 

  • Runs on Qualcomm Snapdragon Octa Core Processor clocked at 1.5GHz powered by a 3GB RAM
  • Internal memory of 32GB
  • 13MP front and rear cameras.
  • Rear camera in the device is accompanied by dual tone LED flash and a laser auto focus
  • Front camera with Phase Detection Auto Focus, an LED flash and a Panorama mode for wider selfies
  • Non-removable 2500 mAh battery

 

  • Connectivity: VoLTE technology for a better 4G experience

 

LYF Earth 2 Price : Rs 19,999

Moto G4 now available in India at Rs 12,499

Motorola which announced Moto G4 last month along with Moto G4 plus, has finally launched G4 in India Yesterday. It’s to be noted that the Moto G4 plus with two variants at Rs. 13,499 & Rs 14,999 is already available in India since last month.

The Moto G4 is priced at Rs. 12,499.

The Moto G4 and the G4 Plus may look quite similar; but the distinguishing points are premium camera components as well as has a fingerprint scanner.

Moto G4 key specs:

  • 5.5-inch screen with FullHD resolution, same as G4 Plus
  • Snapdragon 617 processor, the same processor powers the Moto G4 Plus
  • 2GB RAM
  • 16 GB internal storage, with support for microSD card
  • 13-megapixel rear camera, the Moto G4 Plus has 16 Megapixel camera
  • 5-megapixel front camera same as G4 plus

A  Clear Cannibalism Here : The Moto G4 and Moto G4 plus are so closely priced that the G4 plus will eat the G4.

If the buyer doesn’t want to shell out additional Rs 500-2500/- for a better camera and finger print camera then he will buy G4 instead of G4 Plus. It must be noted the with equal screen size and same form factor this is can be real possibility.

Thus one of the two will eat the other.

The cannibalistic fight will intensify if some other offerings from Motorola in the same price band are considered. This will surely hurt .

Price and Availability of Moto G4 : The Moto G 4th Gen is Exclusively at Amazon at a price of Rs 12,499.

8 Ways to Backup your Data on PC, Mobiles, Websites

How often do you think about backing up all of your data of your PC, Laptop or Website? Rarely.
According to a recent survey, 25% of people never backed up their computer.
However, among 75% of people surveyed last year who do perform data backups, only 8% back up daily, 9% weekly, 19% do it monthly and 39% back up their data yearly.
If you’re a Chart person, then the pie chat below shows how often people backup all of their data on their computers :
How often you back up?
2015 data bckup Frequency
Source: 2015 Backblaze Backup Awareness Survey
This is a worrying sign, as with each passing day, the importance of data backup is increasing for many reasons.
It’s important to routinely get into the habit of backing up all your data. Although the awareness about the importance of Data Backup in increasing (in 2008, 38 percent never backed up all their data). The awareness has still to catch up.
Hence it’s important to get into the habit of backing up data routinely. The more frequent back ups the better. Especially when your work pertains the new important and sensitive data piling up every day.
Here are 8 most common and simple data backup options for people to ensure that their data is safe, always accessible. It’s good to follow this advice: Always have more than one backup to be on the safer side [Info courtesy: ESS Distribution, the leading provider of IT security solutions in Indian market]
  1. USB pendrive: this is the easiest and the cheapest way as USB sticks are easily available at your doorstep. However, their portability means they are easy to lose. Also, the number of read/write cycles a pendrive can take is probably less than some other backup storage devices.
  2. External hard drive: most common method as external hard drives provide you larger capacity, better performance and cannot be lost easily. However, as any hard drive, the external ones are potentially open to malware infection and data loss in case of power cuts. it makes sense for one more reason. Recently my desktop PC started acting weiredly. It sometimes starts, sometimes not. I took it to a computer vendor, he told me the harddisk needs to be formatted. Since for that I have to leave the data with him, my data was at threat. But since I usually backup my hard disk data routinely. I told him to format the hard disk in front of me; and start installing the Operating System. Once done I will leave the PC in his custody. Later, when the problem still persisted, it came to me that it might be RAM error. Actually, it was.
  3. Network Attached Storage: this option was initially considered more suitable for businesses, but provided the amount of data generated and stored by every household, the growing number of computers and other devices at home make dedicated wireless storage solution a good option, although price factor should be taken into account.
  4. Cloud Storage: there are plenty of third party cloud storage options, including completely free, paid, or free with paid extras. You can explore iCloud, Dropbox, Google Drive, OneDrive, Mega and many other options. A good reason to go for cloud storage is automation possibilities, and plenty amount of space that is given even in free options. However, cloud backup requires good and continuous internet connection, which can be a challenge in a country like India. Safety is another concern as you have no control over security breaches in cloud services.
  5. BackUp and Recovery Software: Backing up data using one of the options described above can be tough and time-consuming. However, there is a long list of both free and paid backup and recovery utilities that help you save copies of important files to a separate pendrive, hard drive or cloud. Having many configurations and tools, including file encryption, backup solutions generally support differential backups and incremental backups in addition to full backups which helps saving time on regular backups.
  6. Print out: As simple as that. Print out your contacts and passwords or other important files and store them in a very safe place. While it doesn’t solve the backup problem for most if the users, it is certainly better than nothing as it can protect your e-mail and social media accounts in case of security breach. Also, it is not a bad option for non-tech-savvy people. Remember, though, that extensive printing challenges the environment.
  7.  Prevent ransomware and other malware infections on your system: 5 basic rules to protect your system from ransomware and other malware that can harm your data.
  8. And Finally, to back up the data on blogs, websites and other online properties which you run or where you create content; make it a point to routinely backup all the Data. This can be done using reputed Cloud Storage services.

Hope you follow the above data backing up options.