Muslims were raped in Gujarat & Kashmir then picks up no sound: Arundhati Roy

[email protected] (News Network)
December 25, 2012

roy1

Arundhati Roy Tweets:

 

I do not believe that Delhi is the rape capital. If the rape has been going on for years. Muslims were raped in Gujarat & Kashmir, Manipur also happens but then picks up no sound.

 

Dalit women are raped in Kherlanjhi and his daughter was burned them Then a voice was raised.

 

Only a feudal mindset which raises voice of the people of the great nation, dominated happens with people in Delhi.

 

Chhattisgarh tribal woman with Sony Tyre happened if you will recall. But the police did not have even a raised voice. If the police officer received an award for courage.

 

Poor security forces in Kashmir when Kashmiri forces against rape does not demand a hanging. Rape of a higher-caste Dalit man does not, then no such demand.

 

This time there were hundreds of people gathered in Delhi when the girl was thrown out of the bus, people were standing naked, Someone gave him his cloak Everyone stood.

 

Rich in Delhi - was the first to distinguish between poor. But now they are still the target. Rape is not the issue. When the country was partitioned, we can not even imagine how many were raped, Inside we have a feudal mindset.

 

Rape is a terrible crime, but what people do. The girl is raped does not accept him. How do we live in society. In many cases, the rape of the same family are out of the house, There is too much violence in society.

 

But should not be protesting against choose. Every woman should resist rape. These dual mindset that you will sound but Manipur to Delhi rape of women, and for women of Kashmir Kherlanjhi not raise voice for the downtrodden.

 

Do not resist rape on the ground that he is in Delhi or any other place in Manipur.


Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 26,2020

Facebook will introduce a new notification screen on its platform that will warn users if the article they are about to share is over 90 days old, the company announced on Thursday.

“We’re starting to globally roll out a notification screen that will let people know when news articles they are about to share are more than 90 days old,” Facebook wrote in a blog post.

The social media platform had previously introduced a context button in 2018 that provides information about the sources of articles in the News Feed. Building upon that, the new feature will inform users about the timeliness of the article.

“To ensure people have the context they need to make informed decisions about what to share on Facebook, the notification screen will appear when people click the share button on articles older than 90 days, but will allow people to continue sharing if they decide an article is still relevant,” Facebook said.

The social media giant stated that timeliness is important in understanding the context of an article and curbing the spread of misinformation on the platform.

“News publishers, in particular, have expressed concerns about older stories being shared on social media as current news, which can misconstrue the state of current events. Some news publishers have already taken steps to address this on their own websites by prominently labelling older articles to prevent outdated news from being used in misleading ways,” Facebook added.

Apart from this, the platform will also be testing a similar notification screen for information related to the global Covid-19 pandemic. The notification screen will provide information about the source of the link shared in a post if the link is related to information on Covid-19. It will also direct people to its previously introduced Covid-19 information centre for “authoritative” health information, it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.