Pulwama encounter: One soldier, three militants among 5 killed, two jawans, civilian injured

Agencies
May 16, 2019

Srinagar, May 16: A soldier and three militants were among five persons killed and two jawans and civilian injured in an encounter which ensued during a Cordon and Search Operation (CASO) in south Kashmir district of Pulwama in the wee hours of Thursday, official sources said.

Meanwhile, authorities imposed restrictions in main town Pulwama and adjoining areas besides suspended mobile internet service as a precautionary measure.

Sources said troops of Rashitriya Rifles (RR), CRPF and Special Operation Group (SOG) of Jammu and Kashmir police launched a joint search operation in village Dalipora, Pulwama, following a tip off about the presence of militants in the wee hours.

After sealing all exit points, security forces launched searches in the area, they said. However when the security forces were moving towards a particular area in the village, militants hiding there opened fire with automatic weapons, they said adding fire was returned ensuing in an encounter. Three security force personnel and a civilian identified as Youns Jalal, a local resident were injured in the shootout.

The injured soldiers were airlifted from Pulwama to 92 Base hospital, Badami Bagh Cantonment where one of them identified as Sandeep Kumar succumbed.

Younus was rushed to local hospital from where he was referred to Srinagar, they said.

Sources said bodies of four persons, including three militants, were recovered from the site of encounter adding operation is almost over. The identity of dead persons was being ascertained, they said.

Meanwhile, security forces imposed restrictions in the main town Pulwama and adjoining areas after clashes broke out early this morning. All roads leading to main town have been sealed and nobody was being allowed enter there. People were directed to remain indoor, they said.

Comments

Khasai Khane
 - 
Thursday, 16 May 2019

1 soldier and 3 miltants killed. How does that become 5?

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 12,2020

Bhopal, Mar 12: The Madhya Pradesh Congress on Thursday took a dig at Jyotiraditya Scindia, who broke ranks with the party and joined BJP on Wednesday, by pointing out that neither Prime Minister Narendra Modi nor Amit Shah had not even put out as much a tweet to welcome him in the party, and construed it as "humiliation" for the "maharaja".

"Not even a tweet by Narendra Modi-ji or Amit Shah-ji to welcome Scindia-ji! Modi-ji, Shah-ji, at least do not do it so soon. It has not even been 24 hours yet and you guys have already started humiliating him...!" Madya Pradesh Congress tweeted in Hindi.

Taking a jibe at Mr Scindia, a member of the erstwhile royal family of Gwalior who ended his 18-year-long association with the Congress party on a bitter note, the state Congress said: "He is a maharaja, the one whose history is often mentioned by Shivraj-ji (former Madhya Pradesh Chief Minister Shivraj Singh Chouhan)."

On Wednesday, Jyotiraditya  Scindia joined BJP in New Delhi in the presence of party president JP Nadda. He had resigned from Congress a day earlier after meeting Amit Shah and Prime Minister Narendra Modi.

Mr Scindia will file his nomination for the Rajya Sabha elections on March 13. He is expected to go to Bhopal today.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
April 16,2020

New Delhi, Apr 16: South Delhi District Magistrate Brij Mohan Mishra on Thursday said that the administration is investigating how the pizza delivery boy contracted the coronavirus.

"In the last 15 days, we discovered houses he had delivered food. We contacted people living in 72 houses and they have been asked to stay in-home quarantine. No symptoms have been seen in people related to him. 

Testing of his roommate has been done and his reports are awaited. The rest of the people don't have any symptoms, they have been placed under institutional quarantine. Those in-home quarantines are also asymptomatic," Mishra said.

"Unless a positive case comes, we feel that transmission has not taken place. The boy told us that he was continuously wearing a mask while delivering the food. We are also finding out how he got infected. We are getting the information about the places he visited for delivery. He was tested on the basis of the doctor's advice. Later, he tested positive," he said.

72 families have to stay in home quarantine in the Malviya Nagar area after the delivery boy tested positive for COVID-19 on Wednesday.
Delhi Health Minister Satyendra Jain said that 17 other delivery boys linked with the infected person have also been placed under institutional quarantine.

"A pizza delivery boy has been detected with COVID-19 here. 17 other delivery boys linked with him have been placed under institutional quarantine and 72 people have been placed under home quarantine," Jain said.

Food delivery app Zomato said that the staff of the infected person's restaurant has delivered some orders which were placed on its platform.

"We've been made aware today that a restaurant's employee, who has been recently tested positive for COVID-19, had delivered food in the past to a few customers in the Malviya Nagar area in Delhi. All these customers have already been contacted by the govt authorities... We are not sure whether the rider was infected at the time of delivery," the company said in a statement.

Zomato also claimed that colleagues of the delivery boy have tested negative for COVID-19.
"This restaurant had instructed their riders to wear masks and follow strict hygiene to keep customers safe from any unintended mishap.

All co-workers of the said rider have been tested negative. And as a precaution, the restaurant where this rider worked has suspended operations," read the statement.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.