PM Modi emerges most popular leader on Instagram

Agencies
December 6, 2018

New Delhi, Dec 6: Prime Minister Narendra Modi has emerged as the most popular global leader on social media platform Instagram with 14.8 million followers.

According to a list published by online platform twiplomacy, Mr Modi is closely followed by Indonesian President Joko Widodo with 12.2 million followers.

With 10 million followers, US President Donald Trump is at the third position on photo-sharing platform.

The picture of newly married Indian cricket captain Virat Kohli and his wife, actress Anushka Sharma meeting the prime minister has become the most liked picture posted by any world leader.

The picture has received 18,34,707 hearts since all three have a combined following of 55 million on Instagram.

The picture of Mr Modi standing at a bus stop in snowy Davos ahead of the World Economic Forum 2018 is the second most liked picture with a total of 16,35,978 likes.

The Prime Minister is also very much active on Twitter and Facebook. With more than 43 million followers on his Twitter account and more than 40 million likes on Facebook, he is one of the most popular global leaders on social media platforms.

Mr Modi has a tech-savvy reputation. In 2015, he launched NaMo app to give his followers all the latest information, updates and his day-to-day activities.

Comments

Navaz
 - 
Thursday, 6 Dec 2018

PM Modi twitter account has world most highest number of fake followers, most from african countries, same method they used his all social media accounts, all numbering game 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Srinagar, May 21: Two Border Security Force (BSF) personnel were killed and their weapons snatched by militants in the Pandach area on the outskirts of Srinagar yesterday.

According to IGP Kashmir Vijay Kumar, the two BSF jawans, who were on road surveillance deployment, were fired upon by two of the three terrorists on a motorcycle around 5:15 pm on the 90-Ft Road at Pandach, near Soura. 

They were critically injured and later succumbed to injuries. The terrorists escaped after taking away one AK rifle and one INSAS. Efforts were underway to trace the terrorists.

He said that two jawans, Constable Rana Mandol and Constable Ziaul Haque of ‘C’ company of 37th battalion, were injured and they later succumbed.

“The terrorists managed to take away the weapons of the martyrs. Area has been cordoned off and the search for the terrorists is on”, he said.

Residents around the spot said that the two soldiers were buying chicken for Iftar from a mutton dealer, around 300 meters away from their deployment location when three militants on a motorcycle stopped and opened fire on them.

Medical Superintendent SKIMS Dr Farooq Jan said that both the jawans were brought dead to the tertiary care hospital.

Senior Police officials said it was a “clear case of security lapse” as the two jawans had left their spot of deployment on Srinagar-Kargil-Leh road and gone to a shop 500 metres away on a different road.

They said that possibility of terror attacks and subsequently claims by the new outfit TRF had been flashed to all forces earlier this week.

The terror strike in the capital city has occurred a day after an encounter in downtown Srinagar, where two Hizbul Mujahideen militants, including the top wanted Junaid Sehrai, had been killed on Tuesday.

In the last one month, five Army and Police personnel and two militants had got killed in an encounter in Handwara area of Kupwara, a day before three CRPF men were killed in another attack.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 28,2020

New Delhi, Jul 28: India on Wednesday reported 47,704 more COVID-19 cases in the last 24 hours, taking the country's count of coronavirus cases to 14,83,157, informed the Union Ministry of Health and Family Welfare.

Out of the total cases, there are 4,96,988 active cases in the country while the number of patients cured/discharged and migrated stands at 9,52,744.

With 654 deaths due to COVID-19 in the country reported in the last 24 hours, the death toll rises to 33,425.

The recovery rate among COVID-19 patients has increased to 64.23 per cent. The recoveries to deaths ratio is 96.6 per cent:3.4 per cent, informed the Centre.

As per the data provided by the Ministry, Maharashtra continues to be the worst-affected state from the infection with 1,48,905 active cases and 13,656 deaths due to COVID-19. Tamil Nadu has a total of 53,703 active cases and 3,494 deaths.

Delhi has a total of 11,904 active cases and 3,827 deaths.

The Health Ministry further informed that more than 5 lakh COVID-19 tests were conducted in a single day over two consecutive days. On 26th July, India tested a total of 5,15,000 samples and on 27th July, a total of 5,28,000 samples were tested.

The total number of COVID-19 samples tested up to July 27 is 1,73,34,885 including 5,28,082 samples tested yesterday, said the Indian Council of Medical Research (ICMR).

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.