I’m sure you have been waiting with bated breath to try out WhatsApp’s highly-anticipated UPI-based payment feature. And now WhatsApp Payments is rolling out in India for Beta testers of WhatsApp on Android.
We already knew the company has working with NPCI and the Unified Payments Interface (UPI) to enable users to securely send and receive money right through the app. It was rumored to launch this month and now WhatsApp has started enabling the payments feature, which was spotted in the Android beta of the app.
One of our readers, Vijay Kumar has shared a screenshot of the new payment option that has appeared on his WhatsApp beta app (version #2.18.44) on Android. As you can see in the screenshot below, the ‘Payment’ shortcut appears under the attachments list in a chat window. It replaces the Camera shortcut, which was earlier sandwiched amidst the document and gallery options.
How To Set Up WhatsApp Payments
As for how the WhatsApp Payments feature is going to work, you’ll first need to link your bank account to the messaging app. This is where the UPI framework is going to come in handy and enable you to use your registered WhatsApp number for the setup process. So, let’s take a look at the steps:
1. Open WhatsApp, tap on the three dots at the top right corner and navigate to the Settings > Payments window.
2. Tapping on the payment option will take you to a new window, where you’ll first need to verify your phone number to begin the UPI setup process. Your registered phone number on WhatsApp should be the same as the one used to register for UPI.
3. Once your number is verified, you will be shown a long list of banks. Here, you can go ahead and select the bank and account that you want to link with WhatsApp.
Note: As you can see in the footnotes on this screen, WhatsApp has partnered with ICICI Bank to process UPI payments across the platform.
4. Though it may take some time to process, you’ll see a ‘setup complete’ message on your screen to demarcate that your bank account has been linked and you can now make or receive payments in a conversation itself. You can check out the process in this YouTube video:
As confirmed by popular WhatsApp enthusiast WABetaInfo, the rollout of the payment feature has officially begun for both Android and iOS users. The company is taking its time to slowly make the payment feature available to all users in India. If the feature hasn’t shown up for you, just like us, it is being said that the same would probably make an appearance in the next 10-12 hours.
With the WhatsApp Payments feature, the Facebook-owned messaging giant is looking to grab a share of the digital payments ecosystem of the nation. It will go up against the likes of Paytm, Flipkart’s Phone Pe and even Google Tez, all of which have adopted UPI to ease the payment process for the citizens of India.
And now, with the integration of UPI payments feature into the most-used messaging app in India, it’ll certainly be a boon for the users, and businesses alike. So are you excited to use the WhatsApp Payments feature? Let us know your opinions in the comments below.
Reliance JioFiber with Free 100Mbps Internet to be Launched in March: Report Says
After several months of rumors, speculations and alleged leaks, JioFiber, the much-hyped Fiber broadband network from Mukesh Ambani’s Reliance Jio, may finally see the light of day this March, according to reports today.
The JioFiber service could apparently launch as early as next month, as per a report in DNA. While the exact launch date for the JioFiber service is yet unknown, the story suggests that the company will look to disrupt the country’s broadband market with lucratively-priced high-speed offerings, just like it did with its LTE services back in 2016.
What we do know, however, is that Jio will offer India’s first large-scale, commercial Gigabit services, something the company has long been testing in at least 10 cities around the country including, but not limited to, Mumbai, Delhi-NCR, Ahmedabad, Jamnagar, Surat and Vadodara.
One thing to note here is that the March-end date that is being touted, is unlikely to be the full-fledged commercial launch of JioFiber. Just like it did with its LTE services back in 2016, Jio is expected to have a soft launch next month, whereby the company will offer free services to customers till the official launch at a later date.
Earlier rumors suggested that the pricing of the JioFiber will start at Rs. 500 for 600GB of data at 100Mbps, although, you’ll do well to take these figures with more than just a pinch of salt. It remains to be seen if Jio can do to the home broadband market what it did to the cellular market over the past couple of years.
The company already has a lot of goodwill among consumers because of the way it handled the roll out of its 4G services (all the petabytes of free data didn’t hurt either), so it will be interesting to see if the company can finally also democratize home broadband, which has traditionally suffered from slow speeds, reliability issues and absurdly high pricing. If it can, expect the likes of Netflix, Hotstar and Amazon Prime Videos gain even more traction in the days to come.
‘Drive-by’ Crypto-Mining Affecting Millions of Android Users: Malwarebytes
If you haven’t been paying attention to the rising scourge of crypto-mining scripts on websites hijacking your computer hardware to mine cryptocurrencies, you should.
From Facebook to YouTube, nobody is apparently safe from this growing menace, with recent reports even suggesting that thousands of government sites in the UK were recently targeted by crypto-mining malware. Now, security researchers at Malwarebytes are reporting that they have found evidence that millions of Android devices may have become part of the largest “drive-by crypto-mining campaign” targeted specifically at mobile devices.
According to the research published on the company’s official blog yesterday, the fact that most people do not use any web-filtering or security applications on their smartphones is being exploited by a section of cyber-criminals to run crypto-mining scripts for Monero (XMR), one of the leading cryptocurrencies right now.
“In a campaign we first observed in late January, but which appears to have started at least around November 2017, millions of mobile users (we believe Android devices are targeted) have been redirected to a specifically designed page performing in-browser cryptomining”.
The exploit uses forced redirects and Trojanized apps, which are not new, but in a curious bit of social engineering, they are honest about being crypto miners. While most cyber-criminals would keep this fact hidden, this new wave of miners is being clear about its purpose. The attackers claim the mining is being done to pay for server traffic, and will continue to do so until the visitor can prove they are human and not ‘bots’, by solving a captcha.
As can be seen in the above screenshots, the sites ask visitors to solve a captcha and till then will use the phone’s resources to mine Monero.
Malwarebytes has listed the affected domains and also the sites with redirect you to these domains. It would be wise to block these from your network if you have the know-how. Ominously, the company warns that the problem is going to get worse with more such mining attacks likely to hit the web.
“The first (domain) was registered in late November 2017, and new domains have been created since then, always with the same template”. With cryptocurrencies bouncing back from a slump off-late, it would be interesting to see whether this particular modus operandi will continue in the same vein even after its discovery.
New Skype Bug Could Provide Unrestricted Access to Hackers
A new bug has been discovered in Skype’s updater which can potentially allow hackers to gain complete access to a user’s system. First reported by security expert Stefan Kanthak at Seclists.org, the bug can be exploited to gain unrestricted access to every part of the operating system.
According to Kanthak:
“Once installed, Skype uses its own proprietary update mechanism instead of Windows/Microsoft Update…[Because] Skype periodically runs ‘%ProgramFile%\Skype\Updater\Updater.exe’ under the SYSTEM account, when an update is available, [the] Updater.exe copies/extracts another executable as ‘%SystemRoot%\Temp\SKY.tmp” /QUIET’.”
Kanthak goes on to explain that it is because of the aforementioned executable that the updater is vulnerable. Hackers can make use of DLL highjacking as the executable loads at least one DLL file called ‘UXTheme.dll’ from its application directory instead of loading its from the Windows system directory.
If a local user is able to place the UXTheme.dll or any of the other DLLs loaded by the vulnerable executable, the user will be able to gain access to the SYSTEM account. Microsoft has already ways to avoid the vulnerability, but Kanthak claims that the company’s developers seem to be ignoring the issue.
Kanthak adds that he alerted Microsoft about the bug back in September, but the company has not released a fix. According to Seclists’ reported timeline of the bug, Microsoft is expected to release a fix in a newer version of Skype, instead of rolling out a dedicated security update, as the latter option would be too painstaking giving the company’s development cycle.