Digilocker

DigiLocker is a key initiative under Digital India, the Government of India’s flagship program aimed at transforming India into a digitally empowered society and knowledge economy. Targeted at the idea of paperless governance, DigiLocker is a platform for issuance and verification of documents & certificates in a digital way, thus eliminating the use of physical documents. The DigiLocker website can be accessed at https://digitallocker.gov.in/.

You may download and store various documents like Aadhaar Card, Driving License, PAN Card, Marksheets, Insurance Policies and much  more.

Recently, the Government has issued a notification that driving license, Aadhaar card, PAN Card and other documents retrieved from the Digilocker in electronic mode on your smartphone are valid proof to show to any authority and cannot be disputed.

Android : http://bit.ly/2MkyYn8             iOS : https://apple.co/2vBZvD4

Advertisements

AppLock – Fingerprint

Many times, we need to protect our apps from prying eyes – we do need confidentiality for specific apps.  Smart AppLock is an AppLocker or App Protector that will lock and protect apps using a password or pattern and fingerprint.  You can lock Facebook, Whatsapp, Gallery or any other app with a password and prevent the apps from being exposed by any snooper!

Besides, AppLock can catch intruders by taking a picture and even hide the fact that the app is locked, with a fake error window!

You can configure the smart lock to lock at specific time of day or auto-unlock when connected to specific WiFi or Bluetooth.

Android : http://bit.ly/2LHiu96          iOS : https://apple.co/2LFqSGl  (Similar)

ProtonMail – Encrypted Email

ProtonMail is the world’s largest encrypted email service with over 2 million users. The ProtonMail secure email app for Android brings easy-to-use email encryption to your mobile device by seamlessly integrating PGP end-to-end encryption. ProtonMail also provides a modern user interface with a full set of innovative features such as customizable swipe gestures and the ability to send expiring emails.

 

Using Protonmail ensures your emails stay private and cannot be intercepted or disclosed to third parties. The encryption is done automatically and is completely invisible to the user.  It is hosted entirely in Switzerland, under the protection of the world’s strongest privacy laws
https://protonmail.com/
Android : http://bit.ly/2uPhfcX      iOS : https://apple.co/2JIwzgN

Life360 – Family Locator – GPS Tracker

Life360 simplifies life in the digital world by making it easy to stay connected to the people who matter most.  Just download the app, give it appropriate permissions and you are set to go. Create your own groups, called “Circles,” of loved ones, friends, teammates — whoever matters most and chat with them in Family Locator for FREE. You can also view the real-time location of Circle Members on a private family map that’s only visible on Family Locator.

You can receive real-time alerts when Circle Members arrive at or leave destinations and even track stolen phones or lost phones

The paid plans allow you to create histories and monitor driver behaviour and in the unfortunate case of an accident, help you track the location!

Life360 is great to keep track of your loved ones. Keep track of where your kids and family members are/aren’t!

Android : https://goo.gl/u7Jz7S                    iOS : https://goo.gl/bhcy34

mAadhaar

mAadhaar is the official mobile app developed by Unique Identification Authority of India (UIDAI) to provide an interface to Aadhaar Number Holders to carry their demographic information viz. Name, Date of Birth, Gender & Address along with photograph as linked with their Aadhaar Number in smart phones.
You can download your Aadhaar Card on your mobile phone – no need to carry your original Aadhaar Card. The App also provides for biometric locking/unlocking – this is very useful to protect your biometric data online. The data can be temporarily unlocked through the app, for 10 minutes, when you want to use it.

Registered Mobile Number is essential to use mAadhaar app. In case your mobile number is not registered with Aadhaar visit the nearest Enrolment Centre/Mobile Update End Point.

A very useful app for day to day use.

Android : https://goo.gl/oo3zU7

How to secure your mAadhaar from misuse ->  Click Here

How I Work – 202 -Have I been pwned?

captureCheck if you have an account that has been compromised in a data breach!

This website – www.HaveIBeenPwned.com – is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or “pwned” in a data breach. It is dead simple to use and entirely free so that it is of maximum benefit to the community.

You just need to enter your email id. The site then checks whether your email id was compromised on any of the websites which have been hacked in the past. If your email id is compromised, you are told which site was hacked and you should immediately change your password on that site immediately.

You also have the option to submit your email id to the site and it will alert you in case your id is compromised any time in future.

Have a safe online presence!

How Not to Get Hooked by a ‘ Phishing’ Scam

“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”

“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”

Have you received email with a similar message? It’s a scam called “phishing” — and it involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, PAN number, passwords, or other sensitive information) from unsuspecting victims.

Phishers send an email or pop-up message that claims to be from a business or organization that you may deal with — for example, an Internet service provider (ISP), bank, online payment service, or even a government agency. The message may ask you to “update,” “validate,” or “confirm” your account information. Some phishing emails threaten a dire consequence if you don’t respond. The messages direct you to a website that looks just like a legitimate organization’s site. But it isn’t. It’s a bogus site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.

Tips to help you avoid getting hooked by a phishing scam:

  • If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Legitimate companies don’t ask for this information via email. If you are concerned about your account, contact the organization mentioned in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address yourself. In any case, don’t cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site.
  • Use anti-virus software and a firewall, and keep them up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.

    Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.

    A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software “patches” to close holes in the system that hackers or phishers could exploit.

  • Don’t email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins “https:” (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer’s security.
  • Forward spam that is phishing for information to the original organization that is sought to be represented, so that they can initiate action, and block the same.