IS behind Berlin truck attack: jihadist-linked agency

December 21, 2016

Beirut, Dec 21: A "soldier" of the Islamic State group carried out a truck attack that killed 12 people at a Berlin Christmas market, a news agency linked to the jihadists said today.

Berlin

"A soldier of the Islamic State carried out the Berlin operation in response to appeals to target citizens of coalition countries," the IS-linked Amaq news agency said in a statement posted online.

Comments

shaji
 - 
Wednesday, 21 Dec 2016

Very hard to believe. However, this is highly regretted and condemned in strong words. If some one did it, he might be a fool or mentally disturbed.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 21,2020

New Delhi, Feb 21: Global terror financing watchdog FATF on Friday decided continuation of Pakistan in the "Grey List" and warned the country that stern action will be taken if it fails to check flow of money to terror groups like the LeT and the JeM, sources said.

The decision has been taken at the Financial Action Task Force's plenary in Paris.

The FATF decided to continue Pakistani in the "Grey List". The FATF also warned Pakistan that if it doesn't complete a full action plan by June, it could lead to consequences on its businesses, a source said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 10,2020

Hubei, Feb 10: The death toll in the deadly coronavirus outbreak in China and other parts of the world has reached 904, CNN reported citing Chinese authorities on Monday.

The number of infected people globally has now hit the 40,000 mark.

According to the country's health officials, the number of people, who died from coronavirus in the Hubei Province, has risen to 871.

"As of 24:00 on February 9, Hubei Province reported a total of 29,631 cases of new coronavirus pneumonia, including 16,902 cases in Wuhan. 22,160 patients are still being treated in hospitals. 73,127 people remain under medical observation," read the statement from the Chinese Regional Health Committee.

The novel coronavirus was first detected in China's Wuhan city in late December and has since spread to more than 25 countries.

On Sunday, the new coronavirus even surpassed the fatalities caused by the SARS epidemic in 2003.

The World Health Organisation (WHO) has declared a global health emergency in the wake of the outbreak.

Meanwhile, WHO's international expert mission led by Dr Bruce Aylward embarked for China.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.