35 bishops quit over child sex abuse scandal within Church

Agencies
May 19, 2018

Vatican City,  MAY 18: Thirty-four Chilean bishops announced their resignation on Friday over a child sex abuse scandal within the Church in Chile after three days of intense meetings with Pope Francis at the Vatican.

“We, all the bishops present in Rome, have tendered our resignation to the Holy Father so that he may decide freely for each of us,” the bishops said in a statement read out by a spokesman at the Vatican.

“We want to ask forgiveness for the pain caused to the victims, to the Pope, to God’s people and to our country for the serious errors and omissions we have committed,” the statement continued.

The striking announcement comes after Pope Francis summoned the bishops to the Vatican over the scandal that has come to haunt his papacy.

Several members of the Chilean church hierarchy are accused by victims of ignoring and covering up child abuse by Chilean paedophile priest Fernando Karadima during the 1980s and 1990s.

“We thank the victims for their perseverance and courage, despite the enormous personal, spiritual, social and family difficulties they had to face, to which were often added the incomprehension and attacks of the Church community,” Friday’s statement said.

Last evening, Pope Francis promised “changes” to the Chilean church to “restore justice” following the private meetings with the delegation.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 22,2020

May 22: A Pakistan International Airlines (PIA) flight on its way from Lahore to Karachi, crashed in the area near Jinnah International Airport on Friday, according to Civil Aviation Authority officials.

Geo News reported that the plane crashed at the Jinnah Ground area near the airport as it was approaching for landing. There were more than 90 passengers on board the Airbus aircraft. Black smoke could be seen from afar at the crash site, say eye witnesses.

There were no immediate reports on the number of casualties. The aircraft arriving from the eastern city of Lahore was carrying 99 passengers and 8 crew members, news agency AP said, quoting Abdul Sattar Kokhar, spokesman for the country’s civil aviation authority.

Witnesses said the Airbus A320 appeared to attempt to land two or three times before crashing in a residential area near Jinnah International Airport.

Flight PK-303 from Lahore was about to land in Karachi when it crashed at the Jinnah Garden area near Model Colony in Malir, just a minute before its landing, Geo News reported.

Local television reports showed smoke coming from the direction of the airport. Ambulances were on their way to the airport.

News agency said Sindh’s Ministry of Health and Population Welfare has declared emergency in all major hospitals of Karachi due to the plane crash.

It’s the second plane crash for Pakistani carrier in less than four years. The airline’s chairman resigned in late 2016, less than a week after the crash of an ATR-42 aircraft killed 47 people. The incident comes as Pakistan was slowly resuming domestic flights in the wake of the coronavirus pandemic, Bloomberg reported.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 24,2020

Islamabad, Jun 24: A plane crash which killed 97 people in Pakistan last month was because of human error by the pilot and air traffic control, according to an initial report into the disaster released Wednesday.

The Pakistan International Airlines (PIA) plane came down among houses on May 22 after both engines failed as it approached Karachi airport, killing all but two people on board.

"The pilot as well as the controller didn't follow the standard rules," the country's aviation minister Ghulam Sarwar Khan said, announcing the findings in parliament.

He said the pilots had been discussing the coronavirus pandemic as they attempted to land the Airbus A320.

"The pilot and co-pilot were not focused and throughout the conversation was about coronavirus," Khan said.

The Pakistani investigation team, which included officials from the French government and the aviation industry, analysed data and voice recorders.

The minister said the plane was "100 percent fit for flying, there was no technical fault".

The county's deadliest aviation accident in eight years came days after domestic commercial flights resumed following a two-month coronavirus lockdown.

Many passengers were on their way to spend the Muslim holiday of Eid al-Fitr with loved ones.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.