Here’s How to Verify If Someone Else Is Using Your Aadhaar-Linked Mobile Number

Published:

spot_img

The Department of Telecommunications (DoT) has launched a new website called Sanchar Saathi portal, which allows users to check all the mobile phone numbers associated with their Aadhaar number. The Telecom Analytics for Fraud Management and Consumer Protection (TAFCOP) portal is a part of this initiative, and it enables users to track the number of mobile connections linked to their Aadhaar number.

The TAFCOP portal offers a simple process for users to verify the phone numbers associated with their Aadhaar number. Users can visit the TAF-COP portal and enter their phone number. After selecting the ‘Request OTP’ tab, users will receive an OTP to validate the information. Once the OTP is entered, the website will display all the numbers associated with the Aadhaar number. Users can then report and block any numbers that are not in use or are no longer required.

According to DoT guidelines, individual mobile subscribers are allowed to register up to nine mobile connections in their name. If a subscriber has more than nine connections, they will receive an SMS notification and can take action through the TAFCOP portal.

This new initiative aims to provide users with greater control over their mobile connections and protect them from potential fraud or misuse of their documents. By utilizing the TAFCOP portal, subscribers can ensure that all the mobile connections linked to their Aadhaar number are legitimate and take necessary action to safeguard their information.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...