God can't survive science, says 'Da Vinci Code' author

Agencies
October 13, 2017

Frankfurt am Main, Oct 13: God cannot survive science, "The Da Vinci Code" author Dan Brown said today, putting his faith in technological advances to connect people in new ways that would eventually scrap the need for religion.

"Historically, no god has survived science. Gods evolved," the best-selling American novelist said at the Frankfurt Book Fair, where he unveiled his newest book, "Origin".

The fifth instalment in the wildly popular series that started with "The Da Vinci Code" tracks Harvard professor Robert Langdon's latest code-cracking adventure to uncover the mysteries of the universe, this time exploring the battle between religion and science.

"I happen to believe in looking at advances through technology," Brown told reporters.

"Over the next decade our species will become enormously interconnected at a level we are not used to, and we will start to find our spiritual experiences through our interconnections with each other.

"Our need for the exterior God that sits up there and judges us... will diminish and eventually disappear."

Brown, whose books have sold over 200 million copies, famously drew the ire of the Vatican when "The Da Vinci Code" was published in 2003.

One of the top-selling books of all time, it tells the story of a conspiracy by the Catholic Church to hide the fact that Jesus had a child with Mary Magdalene.

But Brown, 53, insisted that he was not against religion, and that said he just wanted to "start a dialogue".

"I think religion does a lot of good in the world. I also think that the world has changed such that it is no longer a requirement," he said.

He praised Pope Francis for trying to bring the Church into the modern era.

"I think the Church needs to evolve or it will go extinct, and I think that Pope Francis feels that also and is trying very, very hard to make Catholicism relevant in the modern world," he said.

He said his latest novel, released last week and already topping book charts around the world, also delves into current concerns about fake news.

"Now more than ever we need to look at why we believe what we believe, look at our information sources and be very discerning," he said.

In a wide-ranging press conference, Brown also revealed that the intrepid Langdon -- portrayed by Tom Hanks in the Hollywood adaptations of the book series -- was "the man I wish I could be".

Asked whether the professor would have been a Donald Trump voter, Brown replied: "I doubt it. I don't think so."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
August 2,2020

New Delhi, Aug 2: The National Commission for Women (NCW) has issued notice to some Bollywood celebrities named in a complaint against the promoter of a company for allegedly blackmailing and sexually assaulting a number of girls on the pretext of giving them a career in modelling.

Taking cognizance of the complaint filed by social activist Yogita Bhayana of People Against Rape in India (PARI), the NCW scheduled a virtual hearing presided by its chairperson on August 6.

The complaint against Sunny Verma, promoter of a company named IMG Ventures with its headquarter in Chandigarh, alleged that he has been blackmailing and sexually assaulting a number of girls on the pretext of giving them career in modelling.

PARI's Yogita Bhayana wrote a complaint letter to NCW chairperson Rekha Sharma.

"Through his company, he (Sunny Verma) invites the girls on the pretext of organising a Miss Asia contest with a claim that the contest will launch them as models. To make it look genuine, his company has also been taking an entry fee of Rs 2,950. Once the girls apply, they are alluded by the female accomplices of Sunny Verma to submit their nude pictures in order to get the better ranking in the contest," the complaint letter said on July 31.

It alleged that Verma, after receiving the pictures and sometimes even before, used to get in touch with the girls and ask for completely nude pictures and videos.

The complaint letter said that Verma also used to allude as well as threaten the girls to submit to his sexual desires if they were interested in modelling as a career or wish to win the contest.

"Once he established a physical relationship with the girls, he used to blackmail them for regular sexual favours. Many girls from across the country have suffered a sexual and mental assault from Sunny and his accomplices," said the complaint citing several letters, texts and audio clips from several girls as proof of this modus operandi of Sunny Verma and his company.

The complaint also said that Sunny Verma has been previously also arrested on charges of sexual assault.

"We would demand that NCW should investigate the case to its depth and get the guilty punished so that any other person should not dare to exploit these kinds of innocent girls on any pretext. It will be a message to people like Sunny Verma and all associated Bollywood stars. Looking forward to strict action from NCW against sexual offenders like Sunny Verma & others," the complaint said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.