Astronomers discover 83 supermassive black holes 13 billion light-years away

Agencies
March 15, 2019

Washington, Mar 15: Astronomers have discovered 83 quasars powered by supermassive black holes 13 billion light-years away from the Earth, from a time when the universe was less than 10 per cent of its present age.

“It is remarkable that such massive dense objects were able to form so soon after the Big Bang,” said Michael Strauss, a professor at Princeton University in the US.

“Understanding how black holes can form in the early universe, and just how common they are, is a challenge for our cosmological models,” Strauss said in a statement.

This finding, published in The Astrophysical Journal, increases the number of black holes known at that epoch  considerably, and reveals, for the first time, how common they are early in the universe’s history.

In addition, it provides new insight into the effect of black holes on the physical state of gas in the early universe in its first billion years.

Supermassive black holes, found at the centers of galaxies, can be millions or even billions of times more massive than the Sun.

While they are prevalent today, it is unclear when they first formed, and how many existed in the distant early universe.

A supermassive black hole becomes visible when gas accretes onto it, causing it to shine as a “quasar.” Previous studies have been sensitive only to the very rare, most luminous quasars, and thus the most massive black holes.

The new discoveries probe the population of fainter quasars, powered by black holes with masses comparable to most black holes seen in the present-day universe.

The team used data taken with “Hyper Suprime-Cam” (HSC) instrument, mounted on the Subaru Telescope of the National Astronomical Observatory of Japan, which is located on the summit of Maunakea in Hawaii.

The researchers selected distant quasar candidates from the sensitive HSC survey data.

They then carried out an intensive observational campaign to obtain spectra of those candidates, using three telescopes: the Subaru Telescope; the Gran Telescopio Canarias on the island of La Palma in the Canaries, Spain; and the Gemini South Telescope in Chile.

The survey revealed 83 previously unknown very distant quasars.

Comments

ABDUL AZIZ SHE…
 - 
Saturday, 16 Mar 2019

SUBHAANALLAH

 

 
ALLAH ALMIGHTY CREATED EVERTHING  INCLUDING WHOLE UNIVERSE AND WHAT IS IN IT,

HUMAN BEING CANNOT REACH TO UNDERSTAND IT,  HUMAN LIFE NOT SUFFEICENT TO REACH AND KNOW EVERYTHING.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 20,2020

New Delhi, Jun 20: After Prime Minister Narendra Modi said there are no foreign incursions into India, China has once again claimed that Galwan valley of Ladakh union territory is located on the Chinese side of the Line of Actual Control (LAC).

In an official statement on the step-by-step account of the Galwan face-off where 20 Indian soldiers were killed, China's foreign ministry spokesperson Zhao Lijian has said the Galwan valley is located on the Chinese side of the LAC in the west section of the China-India boundary.

"For many years, the Chinese border troops have been patrolling and on duty in this region," Zhao said alleging that since April this year, the Indian border troops have unilaterally and continuously built roads, bridges and other facilities at the LAC in the Galwan Valley.

China has lodged representations and protests on multiple occasions but India has gone even further to cross the LAC and make provocations, Zhao said.

By the early morning of May 6, the Indian border troops, who had crossed the LAC by night and trespassed into China's territory, built fortification and barricades, which impeded the patrol of Chinese border troops, Zhao said adding that they deliberately made provocations in an attempt to unilaterally change the status quo of control and management.

The Chinese border troops, he said, were "forced to take necessary measures to respond to the situation on the ground and strengthen management and control in the border areas."

In order to ease the situation, China and India have stayed in close communication through military and diplomatic channels, he said. "In response to the strong demand of the Chinese side, India agreed to withdraw the personnel who crossed the LAC and demolish the facilities, and so they did.

On June 6, the border troops of both countries held a commander-level meeting and reached consensus on easing the situation. The Indian side, he said, promised that they would not cross the estuary of the Galwan river to patrol and build facilities and the two sides would discuss and decide phased withdrawal of troops through the meetings between commanders on the ground.

"Shockingly, on the evening of June 15, India's front-line troops, in violation of the agreement reached at the commander-level meeting, once again crossed the Line of Actual Control for deliberate provocation when the situation in the Galwan Valley was already easing, and even violently attacked the Chinese officers and soldiers who went there for negotiation, thus triggering fierce physical conflicts and causing casualties."

"The adventurous acts of the Indian army have seriously undermined the stability of the border areas, threatened the lives of Chinese personnel, violated the agreements reached between the two countries on the border issue, and breached the basic norms governing international relations," the spokesperson said.

Beijing, he said, hopes that India will work with China, follow faithfully the important consensus reached between the two leaders, abide by the agreements reached between the two governments, and strengthen communication and coordination on properly managing the current situation through diplomatic and military channels, and jointly uphold peace and stability in the border areas.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 9,2020

New Delhi, May 9: Three promoters of Ram Dev International, recently booked by the CBI for allegedly cheating a consortium of six banks to the tune of Rs 411 crore, have already fled the country before the State Bank of India reached the agency with the complaint, officials said on Saturday.

The CBI had recently booked the company engaged in export of Basmati rice to the West Asian and European countries and its directors Naresh Kumar, Suresh Kumar and Sangita on the basis of complaint from the State Bank of India (SBI), which suffered the loss of more than Rs 173 crore, they said.

The company had three rice milling plants, besides eight sorting and grading units in Karnal district with offices in Saudi Arabia and Dubai for trading purposes, the SBI complaint said.

Besides SBI, other members of consortium are Canara Bank, Union Bank of India, IDBI, Central Bank of India and Corporation Bank, they said.

The Central Bureau of Investigation (CBI) did not carry out any searches in the matter because of the coronavirus-induced lockdown, the officials said.

The agency will start the process of summoning the accused, incase they do not join the investigation, appropriate legal action will be initiated, they said.

According to the complaint filed by SBI, the account had become non-performing asset (NPA) on January 27, 2016.

The banks conducted a joint inspection of properties in August and October, nearly 7-9 months later only to find Haryana Police security guards deployed there, they said.

"On inquiry, it has been come to notice that borrowers are absconding and have left the country," the complaint filed on February 25, 2020, after over a year of account becoming NPA, the officials said.

The complaint alleged that borrowers had removed entire machinery from old plant and fudged the balance sheets in order to unlawfully gain at the cost of banks'' funds, it said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.