Ponzi scheme: Court reserves order on Janardhana Reddy’s bail plea

Agencies
November 14, 2018

Bengaluru, Nov 14: A court here Tuesday, November 13, reserved orders on the bail petition filed by mining baron and former state minister G. Janardhana Reddy, arrested in connection with a multi-crore ponzi scheme case.

Sixth Additional Chief Metropolitan Magistrate V. Jagadeesh posted the petition to Wednesday for orders.

Reddy was arrested on Sunday after a marathon questioning in connection with a money transaction worth crores of rupees allegedly linked to a ponzi scheme.

He was booked under various sections of the Indian Penal Code and the Prevention of Money Laundering Act, and remanded to judicial custody till November 24.

When the petition came up for hearing, Reddy’s counsel R.P. Chandrashekar submitted that his client had no connection with the ponzi case and he had not cheated any investor.

“The irony of this case is that the accused number one — Ahmed Fareed of Ambidant Marketing pvt Ltd — is roaming free on bail and my client (Reddy) has been sent to judicial custody,” Chandrasekhar said.

Ambidant is accused of cheating investors of crores of rupees after promising hefty returns on deposits.

According to police, Fareed has claimed that he had struck a Rs 20-crore deal with Reddy’s close aide Ali Khan because he was promised help by Reddy in connection with an Enforcement Directorate probe into the ponzi scheme case.

Chandrashekhar also submitted that the Enforcement Directorate had also been dragged needlessly by the Central Crime Branch in the case.

Reddy has claimed the allegations against him were part of a “political conspiracy”.

Reddy, a minister during the previous BJP rule, was arrested by the CBI in 2011 in an alleged illegal mining scam case and granted bail three years later.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 13,2020

The Brazilian government said that the Amazon rainforest witnessed deforestation of a record 829 sq km in May, the highest monthly level since 2015.

On Friday, the National Institute for Space Research (INPE) said that deforestation in the Amazon increased by 91 sq km compared to the same period last year, reports Xinhua news agency.

Between January and April, destruction of the forest by illegal loggers and ranchers rose 55 per cent, or a total of 1,202 sq km was wiped out, it said.

The Real-time Deforestation Detection system, a federal project created to monitor human activity in the Amazon, alerted authorities to the increase in the rate of destruction of the rainforest.

A recent study by the Amazon Environmental Research Institute (IPAM) warned that deforestation in 2020 could reach 11,900 sq km if the pace of May, June, and July follows the historical average.

Deforestation in the region has soared since President Jair Bolsonaro took office last year, according to conservation groups.

He has argued that more farming and mining in protected areas of the forest were the only way to lift the region out of poverty.

Bolsonaro's environmental policies have been widely condemned but he has rejected the criticism, saying Brazil remains an example for conservation.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 7,2020

Toronto, May 7: Scientists have uncovered how bats can carry the MERS coronavirus without getting sick, shedding light on what triggers coronaviruses, including the one behind the COVID-19 pandemic, to jump to humans.

According to the study, published in the journal Scientific Reports, coronaviruses like the Middle East respiratory syndrome (MERS) virus, and the COVID19-causing SARS-CoV-2 virus, are thought to have originated in bats.

While these viruses can cause serious, and often fatal disease in people, bats seem unharmed, the researchers, including those from the University of Saskatchewan (USask) in Canada, said.

"The bats don't get rid of the virus and yet don't get sick. We wanted to understand why the MERS virus doesn't shut down the bat immune responses as it does in humans," said USask microbiologist Vikram Misra.

In the study, the scientists demonstrated that cells from an insect-eating brown bat can be persistently infected with MERS coronavirus for months, due to important adaptations from both the bat and the virus working together.

"Instead of killing bat cells as the virus does with human cells, the MERS coronavirus enters a long-term relationship with the host, maintained by the bat's unique 'super' immune system," said Misra, one of the study's co-authors.

"SARS-CoV-2 is thought to operate in the same way," he added.

Stresses on bats, such as wet markets, other diseases, and habitat loss, may have a role in coronavirus spilling over to other species, the study noted.

"When a bat experiences stress to their immune system, it disrupts this immune system-virus balance and allows the virus to multiply," Misra said.

The scientists, involved in the study, had earlier developed a potential treatment for MERS-CoV, and are currently working towards a vaccine against COVID-19.

While camels are the known intermediate hosts of MERS-CoV, they said bats are suspected to be the ancestral host.

There is no vaccine for either SARS-CoV-2 or MERS, the researchers noted.

Follow latest updates on the COVID-19 pandemic here

"We see that the MERS coronavirus can very quickly adapt itself to a particular niche, and although we do not completely understand what is going on, this demonstrates how coronaviruses are able to jump from species to species so effortlessly," said USask scientist Darryl Falzarano, who co-led the study.

According to Misra, coronaviruses rapidly adapt to the species they infect, but little is known on the molecular interactions of these viruses with their natural bat hosts.

An earlier study had shown that bat coronaviruses can persist in their natural bat host for at least four months of hibernation.

When exposed to the MERS virus, the researchers said, bat cells adapt, not by producing inflammation-causing proteins that are hallmarks of getting sick, but instead by maintaining a natural antiviral response.

On the contrary, they said this function shuts down in other species, including humans.

The MERS virus, the researchers said, also adapts to the bat host cells by very rapidly mutating one specific gene.

These adaptations, according to the study, result in the virus remaining long-term in the bat, but being rendered harmless until something like a disease, or other stressors, upsets this balance.

In future experiments, the scientists hope to understand how the bat-borne MERS virus adapts to infection and replication in human cells.

"This information may be critical for predicting the next bat virus that will cause a pandemic," Misra said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.