Sahitya Akademi winner Debesh Roy passes away

Agencies
May 15, 2020

Kolkata, May 15: Veteran Bengali author Debesh Roy, who was conferred the Sahitya Akademi award for his novel 'Teesta Parer Brittanto', died at a private hospital in Kolkata on Thursday, his family members said.

Roy was 84 and he is survived by his son. His wife had died earlier.

He was admitted to the hospital near his residence at Baguihati, in the eastern fringes of the city, on Wednesday after having symptoms like sodium potasium imbalance, sugar problem and breathing problem, his family members said.

He suffered a massive cardiac arrest and died at 10.50 PM.

A regular contributor to a number of Bengali dailies, he was a staunch critic of the attacks on liberals by in the country in recent times and attended protest meetings despite his failing health.

He was born in Pabna in present-day Bangladesh on December 17, 1936. He had five decades of career as a writer.

Besides Teesta Parer Britanta', he will be remembered for books like Borisaler Jogen Mondal , Manush Khun Kore Keno and Samay Asamayer Brittanto . His first book was Jajati.

His last rites will be performed tomorrow.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
April 17,2020

New Delhi, Apr 17: The Indian Railways turned 167 years old on Thursday and for the first time ever, its trains did not carry any passengers on its birthday and instead stood idle in the yards waiting for the nationwide lockdown to end.

On this day 167 years ago, the wheels of the first passenger train in the country from Mumbai to Thane started rolling.

In 1974, Indians experienced life without trains for the first time. In May 1974 during the strike of the railways that lasted for around three weeks, drivers, station masters, guards, track staff and many others went on 'chakka jam' demanding fixed working hours for train drivers and an across-the-board pay hike.

"I can recall those times vividly. I remember that our leader George Fernandes had almost secured a deal with the then railway minister, but it fell through when it was taken to the then Prime Minister Indira Gandhi," All India Railwaymens Federation General Secretary Shiv Gopal Mishra, who was an apprentice in the railways at that time, told PTI.

"Fernandes was arrested in Lucknow. The workers went through a lot at that time. But those were days that angry workers had refused to give in and took great risks to get their demands met," he said.

However, just like this time, four decades ago too freight trains carrying essential supplies were run and the unions agreed to let some passenger trains run on the trunk routes like the Kalka Mail from Howrah to Delhi.

"Never ever in its history, there has been such a long interruption of services. Not during the World Wars, not during the 1974 railway strike, or any other national calamity or natural disaster," a railway spokesperson said.

The first Indian Railways passenger train was flagged off on April 16, 1853, from Mumbai to nearby Thane.

On Thursday, the Railway Ministry wished the railways a happy birthday on Twitter - "Today, 167 years ago with the zeal of 'never to stop' the wheels of the first passenger train from Mumbai to Thane started rolling. For the first time, passenger services are stopped for your safety. Stay indoors & make the nation victorious," it said.

Railway has suspended all passenger services since March 25 till May 3 due to the coronavirus outbreak. Around 15,523 trains run by the railways have been affected including 9,000 passenger trains and 3,000 mail express services which are run daily. It caters to over 20 million passengers every day.

According to the Union health ministry, the death toll due to coronavirus rose to 414 and the number of cases to 12,380 in the country on Thursday.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.