Real Ayodhya is in Nepal, Lord Ram was Nepali, says Nepal PM

News Network
July 14, 2020

Kathmandu, Jul 14: After staking claim to Indian territories of Lipulekh-Kalapani in  a new controversial map,  Nepal Prime Minister KP Sharma Oli on Monday claimed that Ayodhya, the birthplace of Lord Rama, is in Nepal and Lord Rama was Nepali.

“Although real Ayodhya lies at Thori, city in the west of Birgunj, India has claimed that Lord Rama was born there. Due to these continuous claims, even we have believed that deity Sita got married to Prince Rama of India. However, in reality, Ayodhya is a village lying west of Birgunj,” Oli claimed at an event organised at Prime Minister's residence in Kathmandu.

The Prime Minister also blamed India of cultural encroachment by “creating a fake Ayodhya.”

“Balmiki Ashram is in Nepal and the holy place where King Dashrath had executed the rites to get the son is in Ridi. Dashrath’s son Ram was not an Indian and Ayodhya is also in Nepal,” he claimed.

In an attempt to save self from criticism, Oli questioned how Lord Rama could come to Janakpur to marry Sita when there were "no means" of communication. He further said that it to be impossible for Lord Rama to come to Janakpur from present Ayodhya that lies in India.

“Janakpur lies here and Ayodhya there and there is talk of marriage. There was neither telephone nor mobile then how could he know about Janakpur,” Oli said.

Comments

Ahmed Ali Kulai
 - 
Tuesday, 14 Jul 2020

New controversy

 
BJP got next election Muddah

Farhan
 - 
Tuesday, 14 Jul 2020

Ab Ram Mandir Kaha Banega???

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 13,2020

New Delhi, Jun 13: In a bid to provide relief to small businesses amid the coronavirus pandemic, the GST Council on Friday decided to halve the interest rate on late filing of GSTR-3B returns for the period of February, March and April 2020.

The interest rate on late return filing will be 9% from the usual 18% till September 30, 2020. The benefit will be available for small taxpayers with aggregate turnover of up to Rs 5 crore.

For the three months, small taxpayers will not be charged any interest till the notified dates for relief and thereafter 9% interest will be charged till September 30, a Finance Ministry statement said.

"For small taxpayers (aggregate turnover upto Rs 5 crore), for the supplies effected in the month of February, March and April 2020, the rate of interest for late furnishing of return for the said months beyond specified dates (staggered upto 6th July 2020) is reduced from 18 per cent per annum to 9 per cent per annum till 30.09.2020," said the statement.

The Council has also extended relief to small taxpayers for subsequent period of 2020 through waiver of late fees and interest if the returns in Form GSTR-3B for the supplies effected in the months of May, June and July are furnished by September 2020.

It has also decided to reduce the late fee on the filing of GSTR-3B returns for the period between July 2017 and January 2020. The late fee has been capped at Rs 500, but interest will be charged at the existing rate on the due tax liability.

Speaking to the media in New Delhi after a GST Council meet through videoconference, Union Finance Minister Nirmala Sitharaman said that those entities with no tax liability will not have to submit the late fee for the period.

For entities with tax liability but which have not filed returns or have filed returns late, the late fee has been capped at Rs 500 without interest. Interest will, however, be payable on the tax component at the applicable rate for delays.

To facilitate taxpayers who could not get their cancelled GST registrations restored in time, the Council has provided an opportunity for filing of application for revocation of cancellation of registration up to September 30, 2020, in all cases where registrations have been cancelled till June 12, 2020.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 16,2020

Noida, Jul 16: A key aide of 1993 Mumbai blasts case convict Abu Salem who worked in his illegal property business in NCT of Delhi has been arrested by the Special Task Force (STF) of the Uttar Pradesh police, officials said on Thursday.

Gajendra Singh, who was also close to gangster Khan Mubarak, was nabbed in Mumbai late Wednesday night by the Noida unit of the STF, they said.

"Gajendra Singh had taken Rs 1.80 crore from a Delhi-based businessman in 2014 in a property-related case. When he was pressured to return the money, Singh had Khan Mubarak's shooters open fire at the businessman in sector 18 of Noida," Additional Superintendent of Police, STF, Raj Kumar Mishra said.

The businessman was in his car when the attack took place, and he narrowly escaped, the officials said.

Mishra said Singh had paid the shooters Rs 10 lakh, and the agency has cracked the money trail of the transaction.

"Gajendra Singh also invested Abu Salem and Khan Mubarak's money into properties in Delhi-NCR," the officer added.

Singh was wanted in a couple of cases registered at a police station in Noida where he has been lodged now for further proceedings, the STF said. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.