Umobile Biz

Unified solution for banking transactions

U-Mobile is an application for organizing personal finances, developed by the Union Bank of India (UBI). The mobile application allows UBI account holders to conduct numerous banking transactions, such as creating mini-statements, checking account balances, transferring money, managing checks, and paying bills. Regardless of whether users have a UBI savings account, checking account or overdraft account, they can register in the app and Manage their finances anytime and from anywhere.

What is the U-Mobile app?

U-Mobile is the easiest way to sign up for online banking Union Bank of India’s online banking services. It is a good alternative to transacting at the local UBI bank or through their website. The app is very easy to use as it activates the account activated immediately, after all the required data has been submitted. Most of the things that you would normally do at a Union Bank branch can also be done through the mobile app. Union Bank customers can check their account balance and view their recent transactions in the transaction history. A mini-statement is provided to the user by the app; the Union Bank mini-statement shows the last nine transactions. Another advantage of the app is that it can be used anytime, anywhere to directly transfer money or send payments at any time and from anywhere. The money is transferred in Real time to the target account. This is made possible by the partnership with the Immediate Payment Service (IMPS) and the International Financial Services Commission (IFSC). This means that users can freely make changes to their account, as the app is completely safe to use. With these features, it is also possible to receive or transfer money at short notice. Those who use checks can also use the app. The status of the check can be checked, a new checkbook can be ordered, and branches where it can be collected are displayed directly.

Full control over your money

U-Mobile is a suitable app for all those who have an account with Union Bank of India, with which they can use round-the-clock banking services around the clock. Whether it is a business or personal account, this app is fit for purpose. This means that customers can transfer, invest and exchange their money whenever they want. It is completely safe to use as it is approved by IMPS and IFSC. These are just some of the features that make the bank and its app worth recommending.


  • Access to UBI banking 24/7.
  • Create approved UBI account online
  • View mini-statements and check clearings
  • Recognized by IMPS and IFSC


  • Only suitable for people residing in India

Program is available in other languages

  • Scarica U-Mobile – Union Bank of India in italiano [IT]
  • Download U-Mobile – Union Bank of India em português [PT]
  • Pobierz U-Mobile – Union Bank of India po polsku [PL]
  • ดาวน์โหลด U-Mobile – Union Bank of India เป็นภาษาไทย [TH]
  • Tải xuống U-Mobile – Union Bank of India bằng tiếng Việt [VI]
  • Download U-Mobile – Union Bank of India in het Nederlands [NL]
  • Download U-Mobile – Union Bank of India in english [EN]
  • 日本語でU-Mobile – Union Bank of Indiaをダウンロード [JA]
  • Télécharger U-Mobile – Union Bank of India en française [FR]
  • 다운로드 U-Mobile – Union Bank of India [KO]
  • تنزيلU-Mobile – Union Bank of India في عربى [AR]
  • Descargar U-Mobile – Union Bank of India en español [ES]
  • Скачать U-Mobile – Union Bank of India на русском языке [RU]
  • 下载 中国人U-Mobile – Union Bank of India [ZH]
  • Unduh U-Mobile – Union Bank of India dalam bahasa Indonesia [ID].
  • U-Mobile – Union Bank of India uygulamasını türkçe indirin [TR]

Membrane Service Proxy protects the back office of ERGO Direkt Versicherungen in Internet and mobile business

Internet and mobile business are the focus of ERGO Direkt Versicherungen. Via the web and mobile apps, customers can take out insurance policies themselves or maintain their personal data via self-services. This case study describes how the open source project Membrane Service Proxy is used at ERGO Direkt as a security infrastructure for the Internet business. ERGO Direkt is Germany’s most chosen direct insurer and on its way to becoming the leading mobile insurer. The necessary security for the online business is provided by a security infrastructure consisting of firewall and network components supplemented by application-specific checks. Figure 1: Securing the backend systems

Initial situation

Until the summer of 2012, a purely in-house development was used for the functional checking of SOAP and REST-based messages. The core of the in-house development consisted of a technical security validation, which protected against SQL injection and other attacks by checking messages with a rule base. The validation was content-based as well as using white and black lists. The patterns and rules for validation could be configured conveniently via a graphical user interface. Furthermore, the technical security validation took over the monitoring and reporting of attack attempts and rule violations. During operation, the in-house development offered high stability and performance. However, the provisioning of new services was time-consuming and took too long, as it was necessary to manually create web applications that intercepted requests and forwarded them to the technical security validation.


The effort for the provision of new services should be minimized in order to be able to react faster and cheaper. Due to its flexibility and configurability, the technical security validation was to be transferred to the new solution. However, the company did not want to create a web application for each service. In addition to checking the content of messages, the new solution should also validate them against XML and JSON schema descriptions. It should also perform authentication against the backend systems and rewrite internal addresses in WSDL documents into public ones for the Internet.


As a replacement for the self-developed solution, the open source project Membrane Service Proxy from the company predic8 in Bonn was chosen. Membrane is an open source reverse HTTP proxy implemented with Java, with good support for the SOAP protocol and for REST resources. Furthermore, Membrane offers a number of features that are of interest for ERGO Direkt Versicherungen:

  • Validation of messages against XML and JSON Schema
  • Protection against XML and Denial of Service attacks
  • Preparation of WSDL and XML Schema documents (rewriting of addresses)
  • Simple configuration
  • High performance and low resource requirements

The company predic8 was commissioned to develop an extension that integrates the technical security validation into the Membrane and thus replaces the self-developed web applications. A proof of concept was performed to check if Membrane is performant and stable enough for the daily business and if it can work together with the existing technical security validation.

Open Source Sponsorship

For IT operations, it had to be possible to run Membrane in Oracle’s WebLogic Application Server. Since a deployment in WebLogic was not possible so far, ERGO Direkt financed the integration of the Membrane Service Proxy into a web application within the scope of an Open Source Sponsoring. The new Membrane web application is JEE compliant and can be installed in any JEE application server. The sponsored web application, like the Membrane Service Proxy itself, is available to the open source community for download and further development on the github site. Github is a popular platform for collaborative development of open source software on the web.

How it works

Each message is passed through the Membrane Service Proxy, which performs a check and passes a prepared list of parameters to the technical security validation, which then decides how to proceed with the message. Figure 1 illustrates the flow of requests from the web or smartphone. Instead of developing a connection with a Web application for each new service, as was previously the case, virtual services are configured with Membrane. To set up a virtual service, which is also called a service proxy, all that is needed is a few lines of configuration in an XML file. Securing a service now takes only a few hours instead of several days to develop a web application with Java. Figure 2 shows the Membrane Web application and the connection to technical security validation via a plugin that extracts the data needed for validation from the requests. Figure 2: Membrane Web application and technical security validation The plugin, which was specially developed for ERGO Direkt, is responsible for processing the data from the requests and for triggering the technical security validation. Validation errors and possible error messages from the back office are filtered out and replaced by tickets. Details about faulty calls can then be requested from a hotline via the tickets. Attackers who try to provoke meaningful error messages via invalid queries thus only receive meaningless ticket numbers. Furthermore, system information that is not required is filtered out of the responses. In addition to SOAP-based web services, REST and the JSON format popular with apps and HTML5 applications are also supported.


All set tasks could be fulfilled:

  • New services can be integrated within a short time.
  • The existing technical security validation is still used.
  • Membrane Service Proxy can be operated in WebLogic Server.
  • Messages are validated against XML and JSON schema.
  • Authentication against the back office systems takes place.

After successful completion of a test phase, Membrane has been in operation since August 2012. The following comparison shows the differences between the previous solution and the Membrane-based one:

Feature Previous solution Membrane Service Proxy
Connection of technical security validation Via manually created code declarative
XML schema validation no yes
JSON schema validation no yes
Schematron validation no yes
Setting up new services Java programming is necessary declarative
Filtering stack traces no yes
configuration via WSDL no yes
Filtering of installation details no yes
Filtering out error messages no yes
Authentication in backend yes yes
JSON and GWT support no declarative

The pop-ups are a social engineering attack that tries to fool you into subscribing to its push notifications so that they can send unwanted ads directly to your screen. The website will display a “confirm notifications” window asking you to subscribe to notifications from this website. If you press the “enable” button, then you will begin seeing annoying pop-up window from on your desktop even when your web browser is closed. The website will show the following notification: wants to Show notifications Please Press Allow to Continue Watch! 

You should not click the “Allow” button because the site will spam your internet browser with undesirable ads. If you have allowed the website to send out notifications in your web browser, then you need to delete these permissions. These pop-up advertisements are caused either by destructive ads on the websites you go to or some adware. This manual was written to help Windows users get rid of malware from their PC. When it concerns adware, these malicious programs are bundled with other free software that you download from the Internet. Sadly, some free downloads do not properly indicate that another tool is also set up, and you may find that you have installed adware without your knowledge. Once a malicious program is set up, whenever you search the Internet, unwanted advertisements from will show pop-up windows. Here are a few common signs that you have adware on your system:

  • Your web internet browser’s homepage has changed for inexplicable reasons without your consent.
  • Ads appear in places they should not be.
  • Links redirect to websites different from what you expect.
  • Web pages that you usually visit do not display properly.
  • Browser notifications appear that suggest fake updates or other tools.
  • Some other unwanted programs may let you set up without your understanding.

Follow the steps in the slider to explain how to use GridinSoft Anti-Malware.

  • STEP 1. Download GridinSoft Anti-Malware. Click on the installer in the lower left area of the browser.
  • STEP 2. Allow changes via the user account control panel.
  • STEP 3. Click on “Install“Install the program.
  • STEP 4. Wait until the program is completely installed in your PC.
  • STEP 5. Click “Ready“.
  • STEP 6. Run the program. Wait until the scanning is completed and all malware linked to “” is connected.
  • STEP 7. Click on “Clean now” for remove
  • STEP 8. Select the license type and purchase the program. Remove all identified threats with purchased version of the software.
  • STEP 9. Exit all browsers. In GridinSoft Anti-Malware, click on “Tools“, then select “Reset browser settings” option.
  • STEP 10. Select Reset Browser and appropriate reset options automatically, then click “reset“.
  • STEP 11. Click on “Protect“. Make sure that Internet Security mode is enabled.

Tips to remove manually from your PC.

In order to get rid of from your system, you can find the “Uninstall a program” function in your PC depending on the version of Windows operating system:

  • For Windows 8/10: Right-click Start – DeepL access menu – Control Panel – Uninstall a program. You can check the list of applications and utilities installed on your PC. Find suspicious software that may cause problem, then right-click on it and select “Uninstall“.
  • For Windows 7Click Start – Control Panel – Uninstall a program. Check the list of programs and software available in your PC that might cause problem, then press “Uninstall“.
  • For Windows XPClick Start – Control Panel – Add Remove Programs. You will find the list of available programs on your PC. Right-click on suspicious software that might cause problem and select “Uninstall“.

Here is the detailed process with screenshots on how to uninstall unwanted software manually.

    1. Right-click on the Windows logo in the lower-left area of the screen, then select “Control Panel“:

How to launch the Control Panel in Windows

    1. In the “Programs” section, click on “Uninstall a program“:

Control Panel – Uninstall a program

    1. Right click on specific unwanted application, select “Uninstall“:

How to uninstall a program in Windows

Warning. Some unwanted programs may be active (running) while you are trying to uninstall them. It might be necessary for you to terminate their task via the Task Manager application. Here is how you can do that:

    1. Right-click on Windows Taskbar, then select “Task Manager“:

How to launch Task Manager

    1. Select specific task related to unwanted program, then right-click and select the option “End Task“:

How to terminate task of specific program in Windows

Warning. Manual removal of malware as described above is often a very time-consuming undertaking. It requires a lot of technical skills and does not guarantee absolute repair of your system. We recommend you choose our fully automated solution to fix your PC on a professional basis.

How to fix Google Chrome homepage and search engine settings manually.

    1. Click on Google Chrome menu in the form of three vertical dots, then select “the settings“:

Google Chrome settings

    1. Scroll down through Google Chrome settings until you reach “At startup” section. Select “Open a specific page or pages“. Find suspicious unwanted home page, then clock on “Delete“:

Google Chrome – Set pages

    1. Find in Google Chrome settings “Search engine“Section. Select your preferred search engine to be activated if you mess up your search settings (changed) by adware or browser hijacker:

Google Chrome search engine parameters

    1. Click on “Manage search engines“.
    2. If you find certain search engine that you do not want to be your default, then click “Remove from list“:

Remove unwanted search engine from Google Chrome list

How to restore Mozilla Firefox homepage and search engine settings manually.

    1. Mozilla Firefox, click on the menu in the form of three horizontal lines, then select “Options“:

Mozilla Firefox Options

    1. In the “General“section, check home page settings. Remove unwanted parameters, or click “Back to factory settings“:

Mozilla Firefox Home Page Settings

    1. In the “Search” section of Mozilla Firefox, select your preferred search engine:

Search engine selection in Mozilla Firefox

    1. You can also remove unwanted search engine by clicking the completely from Mozilla Firefox “Delete” button to remove it the next time:

Remove unwanted search engine from Mozilla Firefox

Instructions Repair Internet Explorer home page and search engine settings manually.

    1. In Internet Explorer, click on the settings menu in the form of a cogwheel, then select “Internet Options“:

Internet Explorer Options

    1. Click on the “General” tab, then check the Home Page settings. Remove unwanted Home Page from the section, or click “Use new tab“. Click “Apply” to save changes:

Home page of Internet Explorer settings

    1. In Internet Explorer, click on the settings menu in the form of a gear, then select “Manage add-ons“:

Manage add-ons from Internet Explorer

    1. Click on “Search providers“, then select undesirable search engine and click “Delete” button to remove it in the context:

Internet Explorer – search provider

Guide to change Opera homepage and search engine settings manually.

    1. Click Opera menu in the form of “Opera” button, then select “the settings“:

Opera settings

    1. Click on “Browser” section, then select “Set pages“:

Opera – Set pages

    1. Find unwanted home page of Opera, then click “X” next to it to remove it:

Opera start pages

    1. In the “Search” section, click on “Manage search engines…“:

Opera – Manage search engines

    1. Click on “Make default” to select your preferred default search engine, then click on “Done“:

Opera default search selection

Delete unwanted extensions from Google Chrome.

    1. Click Google Chrome menu in the form of three vertical dots, then select “the settings“:

Google Chrome settings

    1. Click on “the settings” in the left menu (in the form of three horizontal lines), then select “Extensions“: Google Chrome extensions
    2. Find unwanted extension, then click “Delete” button to remove it at the next:

Remove unwanted extension from Google Chrome

Remove unwanted add-ons from Mozilla Firefox.

    1. Mozilla Firefox, click on the menu in the form of three horizontal lines, then select “Add-ons“:

Access Mozilla Firefox add-ons

    1. Click on the “Extensions” item. If you see suspicious add-ons, disable and delete them afterwards:

Remove suspicious extensions from Mozilla Firefox

Get rid of unwanted addons from Internet Explorer.

    1. In Internet Explorer, click the settings menu in the form of a cogwheel, then select “Manage add-ons“:

Manage add-ons in Internet Explorer

    1. In the section called “Toolbars and Extensions“, find specific unwanted add-on, then click “disable” button to put it in context:

Disable unwanted add-on in Internet Explorer.

Cleaning unwanted extensions from Opera.

    1. Click on Opera menu in the form of “Opera” button, then select “Extensions“:

Access Opera extensions

    1. Find specific unwanted extension, then click “disable” button associated with their:

How to disable extensions in Opera

Disable push notifications from Google Chrome.

    1. Click on Google Chrome menu in the form of three vertical dots, then select “the settings“:

Google Chrome settings

    1. Scroll down to the bottom of the page, then click “advanced“:

Advanced settings of Google Chrome browser.

    1. In the “Privacy and Security” section, click on “Content Settings“:

Google Chrome Content Settings

    1. Click on “Notifications“:

Google Chrome Notifications

    1. Find specific website that displays unwanted push notifications, click on the options in the form of three vertical dots, then click on “Delete“:

How to remove unwanted push notifications from Google Chrome.

Disable push notifications from Mozilla Firefox.

    1. Mozilla Firefox, click on the menu in the form of three horizontal lines, then select “Options“:

Mozilla Firefox Options

    1. Scroll down to “Privacy & Security” section, then find “Notifications“, click on “the settings” button to put it in context:

Mozilla Firefox notifications

    1. Find unwanted websites that keep displaying unwanted notifications, then change the status from “allow” to “Block“. Additionally, check box “Block new requests ask notifications to allow,“. then click “Save changes“:

How to block unwanted notifications in Mozilla Firefox

important note! Trying to fix browser manually after malware attack is definitely not easy, requires more skills and time, even with detailed description as above. We recommend you try our absolutely free feature of GridinSoft Anti-Malware to reset your browser automatically within just a few mouse clicks!

  • Follow the steps in the slider to explain how to use GridinSoft Anti-Malware.
  • Tips to remove manually from your PC.
    • STEP 1. regularly uninstall unwanted software (via Control Panel).
    • STEP 2. fix your browser home page and search engine settings.
    • Guide to fix Google Chrome homepage and search engine settings manually.
    • Guide Mozilla Firefox home page and search engine settings manually fix.
    • Guide to fix Internet Explorer home page and search engine settings manually.
    • Guide to change Opera homepage and search engine settings manually.
    • STEP 3. remove unwanted extensions from browsers.
    • STEP 4. disable push notifications from browsers.
    • STEP 5. reset origin of browser either manually or automatically (video instructions).

I have been working as a marketer for years and I love to search for interesting topics for you Umobile Biz.

Leave a comment

Your email address will not be published. Required fields are marked *