South American catfish netted in Umiam lake

October 8, 2013

American_catfishShillong, Oct 8: The discovery of a South American sucker-mouth armored catfish at the picturesque Umiam Lake near here has baffled not only local fishermen but scientists alike in Meghalaya.

Native to the Amazons and South American rivers, the catfish was caught by a local fisherman on September 24 and since then he has kept it in a tub of water.

The 500 gm captured specimen is the first documented record of such an adult or near adult fish of the species captured from open waters of the North East region, particularly in Meghalaya, a scientist at Zoological Survey of India here told PTI here.

According to scientists here, the specimen is native to Orinoco River basin in Venezuela but has been recorded to have been found in fresh waters in Hawaii (called the long-fin armored catfish), in the USA (called sailfish catfish), China and Philippines where it was called a janitor fish.

The species was reported from south India as introduced species and cultured in lakes, streams and other water bodies and was found to be highly invasive in nature.

The dark brown tropical fish with its beautiful sail-like dorsal fin is a common import for aquariums all over the world, fish experts at the North Eastern Hills University said.

This could be a theory to believe as to how the fish got into Umiam lake, they said. "Someone might have found the fish too big for their aquarium and let it directly into the water body where it thrived and found its way to the lake."

On the fish's impact on local eco system, scientists concluded that it may become invasive in future as exotic species have the tendency to compete with the native species.

"Being armed with spines and hard shell-like body structure, it may affect the native species," the scientists said.

In its native habitat in South America, the fish species inhabit freshwater streams and lakes and in weedy, mud-bottomed canals and commonly browse on substrate, mainly feeding on benthic algae and aquatic weeds.

It also feeds on worms, insect larvae and other bottom-dwelling invertebrates as food, the scientists added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 9,2020

Soon, you may be able to withdraw cash from an ATM without touching any part of the machine. AGS Transact Technologies, a provider of cash and digital payment solutions and automation technology, on Monday said it has successfully developed and tested a touchless ATM solution in light of the COVID-19 pandemic.

The ‘contactless' solution, currently under demo at interested banks, enables a customer to perform all the steps required to withdraw cash from an ATM using the mobile app itself. 

The customer simply has to scan the QR code displayed on the ATM screen and follow the directions on their respective bank's mobile application. 

This includes entering the amount and mPIN required to dispense the cash from the ATM machine. 

According to the company, the QR code feature makes cash withdrawals quicker and more secure, and negates the chances of compromising the ATM Pin or card skimming.

"The new Touchless ATM solution is an extension of the flagship QR Cash solution which ensures safety of the users and will provide a seamless cash withdrawal experience with enhanced security," said Ravi B. Goyal, Chairman and MD, AGS Transact Technologies Ltd.

With minimum investment, the banks can enable this solution for their ATM networks by upgrading the existing software.

AGSTTL has so far installed, maintained and managed a network of over 72,000 ATMs across the country and also provides customised solutions to leading banks. 

The company earlier introduced UPI-QR based Cash withdrawal solution in partnership with Bank of India. 

This is how the solution works.

Open the Bank mobile application on your smartphone and select QR Cash Withdrawal. Enter the amount you wish to withdraw on the mobile app and scan the QR code on the ATM screen.

Next, confirm the amount by clicking on ‘proceed' in the app and enter the mPin to authenticate the transaction. Now collect the cash and receipt and you are done.

"The seamless, cardless and touchless withdrawal method is designed to provide easy transaction flow, without the need to touch the ATM screen or enter the pin," said Mahesh Patel, President and Group Chief Technology Officer, AGS Transact Technologies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 18,2020

New Delhi, Jun 18: Vodafone Idea on Thursday told the Supreme Court that it has incurred Rs 1 lakh crore losses as it insisted it is not in a position to furnish bank guarantees.

A bench comprising Justices Arun Mishra, S. Abdul Nazeer, and M.R. Shah, taking up the adjusted gross revenue (AGR) matter through video conferencing, directed the telecom companies to submit their financial documents and books for the last 10 years.

Asking Vodafone if it was a foreign company, the bench said that how can the company say it would not furnish any bank guarantee.

"What if you fly away overnight in future without paying anything?" it asked.

Senior advocate Mukul Rohatgi, representing Vodafone Idea, denied his client is a completely foreign firm and cited before the bench its tie-ups and investments.

Vodafone owes over Rs 58,000 crore as AGR dues and so far, has paid close to Rs 7,000 crore.

Rohatgi contended before the court that the telecom company is in a tough situation, and cannot furnish any fresh bank guarantee, as profits have eluded the company in past many quarters. He submitted before the bench that Rs 15,000 crore bank guarantees are lying with the government, and his client's losses are over Rs 1 lakh crore.

"I cannot offer any more surety," he informed the bench.

Justice Mishra noted that this is public money and these dues should be recovered. "Do not tell us that you will pay if you were to make profits... the money must come," he noted.

Justice Shah observed that the telecom industry is the only industry which earned during the Covid-19 pandemic. "After all, this money will be used for public welfare", he said.

Rohatgi argued that his client would have to fold up if orders were issued to clear dues tomorrow. "11,000 employees will have to go without notice, as we cannot pay them," he added.

Senior advocate Abhishek Manu Singhvi, appearing for Bharti Airtel, contended before the court that out of Rs 21,000 crore AGR dues, the company has already deposited a sum of Rs 18,000 crore.

He argued that his client has given a bank guarantee, in excess of demand, to DoT, and supported the proposal for phased repayment of remaining AGR dues. He insisted that the company needs to sit down with the government and calculate the dues. Airtel owes Rs 25,976 crore after paying Rs 18,000 crore, as per the government.

Senior advocate Arvind Datar, representing Tata Telecom, informed the bench that his client has paid Rs 6,504 crore in AGR dues so far, and furnishing a bank guarantee may adversely impact investments in the sector.

The total AGR dues are close to Rs 1.5 lakh crore.

The top court will now take up the matter in the third week of July.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.