Hartal across Kerala after RSS activist hacked to death

coastaldigest.com news network
July 30, 2017

Thiruvananthapuram, Jul 30: The Bharatiya Janata Party and its allies on Sunday observing a state-wide dawn-to-dusk hartal in Kerala after an RSS activist was hacked to death allegedly by a group of CPI(M) workers at Sreekaryam in Thiruvananthapuram around 9.30 p.m. on Saturday.

S.N. Rajesh, 34, who had suffered deeps wounds in his hands and legs breathed his last at a private hospital. He was going home after attending the daily meeting of his organization when the incident took place.

Violence continued to rock the city and its suburbs for the third consecutive day on Saturday. Sporadic incidents of violence were reported from the outskirts of the city, especially Kattakada and Parassala.

There was heavy deployment of police personnel in various parts of the city to ensure that there were no further retaliatory attacks in the aftermath of a series of clashes among CPI(M) and BJP activists since Thursday.

Focused on bringing to book those responsible for the attacks, the city police took three more persons, allegedly BJP activists, into custody in connection with the attack on the residence of CPI(M) State secretary Kodiyeri Balakrishnan’s son Bineesh Kodiyeri.

The Poojappura police, which apprehended the three persons were yet to divulge their identities.

The police on Friday had arrested 11 activists of either parties, including CPI(M) councillor I.P. Binu of the Thiruvananthapuram Corporation, following which they were remanded to judicial custody for 14 days.

Isolated incidents of violence were reported from other parts of the district, including Kattakada, despite prohibitory orders. Unidentified miscreants threw stones at the house of CPI(M) Kattakada town branch secretary Tomy Antony by around 11.30 p.m. on Friday. The CPI(M) alleged the incident to be the handiwork of BJP activist.

Separately, Inspector General (Thiruvananthapuram zone) Manoj Abraham announced a reward of Rs. 5,000 for Prathinjaya Kumar, the civil police officer attached to the Museum police, for his brave deed in attempting to apprehend those who were behind the attack on the BJP office.

Comments

Milan
 - 
Sunday, 30 Jul 2017

Rss is not safe anymore in india. Send them to England 

abdullah
 - 
Sunday, 30 Jul 2017

RSS - BJP Itself killed him.

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
coastaldigest.com web desk
June 17,2020

Remember social media memes of Chinese companies exporting #BoycottChina hats and t-shirts to India? This time India’s sensational and saffronite TV anchor Arnab Goswami vindicated those memes by hosting an anti-China debate show which was sponsored by Chinese companies!

While the last night's debate was all about boycotting Chinese products in the wake of massacre of over 20 Indian soldiers by their Chinese counterparts in eastern Ladakh, the show was brazenly promoting Chinese products through advertisement placements. 

During the debate, amongst the flashy headlines, there were two brand sponsorships that appeared: VIVO and Xiaomi. Both companies are giant Chinese multinational corporations. 

Twitter user Nirmala Tai, who was among those who spotted this irony, highlighted two instances during the debate where the logo of one of the brands popped up, and one where Xiaomi was found promoting the Mi 10. 

Many Twitterati used Goswami’s some of the favourite words such as ‘hypocrite’ and ‘anti-national’ to target him. They hit out at his channel for accepting sponsorship deals from Chinese brands at a time when anti-China sentiment is strong in the country.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 3,2020

Bengaluru, Jun 3: Lack of awareness on rail travel norms led to a tense situation on a Karnataka train as a female passenger was forced to disembark midway after her fellow passengers raised a hue and cry on seeing her knuckle stamped, mistaking it for a quarantine stamp, an official said on Tuesday.

"Many passengers on the train with the woman raised a hue and cry on seeing her stamped and complained to the TTE. She was later disembarked at Tumkur," a South Western Railway (SWR) zone official said.

The woman was travelling from Bengaluru to Belagavi as a transit passenger. Her status as such a passenger was stamped on her knuckle.

However, after some time, her fellow passengers observed her stamped hand and misunderstood that she was violating the quarantine norms.

Without realising that she was just a transit passenger who will be quarantined on reaching her destination, they created pandemonium and complained to the travelling ticket inspector.

"Following the public pressure, she was forcibly disembarked in Tumkur station," said the official.

Incidentally, the railways allows transit passengers to travel.

The official said the TTE would not have been aware of the rules and must have yielded to the passengers' pressure.

Later, the woman was allowed to board another train and reach her destination, the official said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.