India test-fires nuclear-capable Prithvi-II missile

October 7, 2013

Prithvi-II_missileBalasore(Odisha), Oct 7: India today test-fired its indigenously developed nuclear-capable Prithvi-II missile with a strike range of 350 km from a test range at Chandipur, about 15 km from here.

The surface-to-surface missile was test fired from a mobile launcher in salvo mode from launch complex-3 of the Integrated Test Range at about 9.14 AM, defence sources said.

"The missile was randomly chosen from the production stock and the total launch activities were carried out by the specially formed SFC and monitored by the scientists of DRDO as part of practice drill," the sources said.

"The missile trajectory will be tracked by the DRDO radars, electro-optical tracking systems and telemetry stations located along the coast of Odisha," they said.

"The downrange teams onboard the ship deployed near the designated impact point in the Bay of Bengal will monitor the terminal events and splashdown," they said.

Inducted into India's Strategic Forces Command in 2003, the Prithvi II missile, the first missile to be developed by DRDO under India's prestigious IGMDP (Integrated Guided Missile Development Program) is now a proven technology, said a defence source.

"The launch was part of a regular training exercise of SFC and was monitored by DRDO scientists," the source said.

Such training launches clearly indicate India's operational readiness to meet any eventuality and also establishes the reliability of this deterrent component of India's Strategic arsenal, the source said.

Prithvi is capable of carrying 500kg to 1000kg of warheads and is thrusted by liquid propulsion twine engines. It uses advanced inertial guidance system with manoeuvering trajectory.

The last user trial of Prithvi-II was successfully carried out from the same base on August 12, 2013.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 18,2020

Jan 18: Days after the arrest of Deputy SP Davinder Singh along with two Hizbul Mujahideen terrorists, Shiv Sena on Saturday questioned the role of police in the Kashmir Valley.

"Cross border infiltration is ongoing in Kashmir. But the police machinery is being used to help the terrorists in Kashmir to safely cross the border (to Pakistan) and a President's medal awarded Deputy SP was arrested for doing so. In Kashmir (it seems), the government is using the police for some other purposes, what will the country's Home Ministry say if somebody has a doubt in connection with the Pulwama attacks," Sena mouthpiece, Saamna, read.

This was in reference to the incident in which Jammu and Kashmir police intercepted a vehicle on Sunday and arrested DySP Davinder Singh along with two top Hizbul Mujahideen terrorists, who were travelling together.

The Sena mouthpiece asserted that the impact and acceptance of the Centre removing Article 370 should be visible "through the people" during the upcoming Republic Day celebrations.

"Jammu and Kashmir is now a Union Territory. It is being ruled by the Centre through President's Rule. The government had removed Article 370 in a historic decision...The joy and excitement in the people over the removal of 370 should be visible in the Republic Day celebrations this time. The tricolour should be seen flying over all houses in Kashmir, it is the least that can be expected," it added.

The Sena mouthpiece further said that with the arrest of terrorists in the recent days, it hoped that "Republic Day will be celebrated safely in Delhi, Jammu and Kashmir".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 22,2020

New Delhi, Jun 22: With an increase of 14,821 new cases and 445 deaths, India's COVID-19 count reached 4,25,282 on Monday.

According to the latest update by the Union Ministry of Health and Family Welfare (MoHFW), 13,699 deaths have been recorded due to the infection so far in the country.

The rise in confirmed cases today is lower than the highest spike of 15 thousand plus cases registered on Sunday.

The count includes 1,74,387 active cases, and 2,37,196 cured/discharged/migrated patients.

Maharashtra with 1,32,075 confirmed cases remains the worst-affected by the infection so far in the country. The state's count includes 60,161 active, 65,744 cured, discharged patients while 6,170 deaths have been reported due to the infection so far.

Meanwhile, the national capital today became the second-worst affected region in the country with the number of confirmed cases in Delhi reaching 59,746 as opposed to Tamil Nadu's 59,377 cases.

While 2,175 deaths have been reported in Delhi due to the infection so far, the toll in Tamil Nadu stands at 757.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.