You're a fighter, will overcome this challenge: Modi to UK PM who tests coronavirus positive

News Network
March 27, 2020

New Delhi, Mar 27: Prime Minister Narendra Modi on Friday described British premier Boris Johnson as a "fighter" and hoped he recovers from coronavirus infection.

"Dear PM @BorisJohnson, you're a fighter and you will overcome this challenge as well," Modi tweeted.

He said he prays for his good health and extends best wishes in ensuring a healthy UK.

Johnson said on Friday that he has tested positive for coronavirus after experiencing mild symptoms and is now self-isolating at 10 Downing Street in line with the medical advice.

"I am now self-isolating, but I will continue to lead the government's response via video-conference as we fight this virus," he said.

Comments

Kannadiga
 - 
Friday, 27 Mar 2020

Fit for only bogus comments and not  for countrymens welfare. A present we all can see Kerala CMs action and program. Each and every one has to salute him i/o  Taal Bajao foolinesh.

 

 

 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 15,2020

New Delhi, May 15: A group of doctors from the AIIMS, Raipur has recommended restrictions on the use of mobile phones in healthcare institutions amid the COVID-19 pandemic, warning that such devices can be a potential carrier of the virus and lead to infection among healthcare workers.

In a commentary published in the BMJ Global Health journal, the doctors stated that mobile phone surfaces are a peculiar 'high-risk' surface, which can directly come in contact with the face or mouth, even if hands are properly washed and one study indicates that some healthcare workers use phones every 15 minutes to two hours.

Though there have been many significant guidelines from various health organisations like the WHO and CDC focusing on prevention and control of disease, the commentary highlighted "there is no mention of or focus on mobile phones in these guidelines, including the WHO infection control and prevention guidelines, which recommends the use of handwashing".

In healthcare facilities, phones are used to communicate with other health care workers, look up recent medical guidelines, research drug interactions, understand adverse events and side effects, conduct telemedicine appointments and track patients among others, stated the document.

The document has been authored by Dr Vineet Kumar Pathak, Dr Sunil Kumar Panigrahi, Dr M Mohan Kumar, Dr Utsav Raj and Dr Karpaga Priya P from the Department of Community and Family Medicine.

"In their tendency to come in direct contact with the face, nose or eyes in healthcare settings, mobile phones are perhaps second only to masks, caps or goggles," the authors said.

"However, they are neither disposable nor washable like these other three, thus warranting disinfection. Mobile phones can effectively negate hand hygiene... There is growing evidence that mobile phones are a potential vector for pathogenic organisms," they said.

It is the need of the hour to address proper hygienic use of mobile phones in healthcare settings. In a study in India, almost 100 per cent of health workers of a tertiary care hospital used mobile phones in the hospital, but only 10 per cent of them had at any time wiped their mobile phones clean, the commentary published on April 22 said.

"The safest thing to do is to consider your phone as an extension of your hand, so remember you are transferring whatever is on your phone to your hand," Dr Pathak said.

Amidst the ongoing pandemic, two biggest mobile phone companies have uploaded their user support guidelines, saying that 70 pc isopropyl alcohol or Clorox Disinfecting Wipes can be used to gently wipe the exterior surface of phones in switched-off mode.

However, in doing so, the use of bleach or entry of moisture through any of the openings must be avoided, and any harsh chemical may damage the oleophobic screen, leading to damage in the touch screen sensitivity of the phone, the article stated.

Mobile phones are one of the most highly touched surfaces according to the Centers for Disease Control and Prevention (CDC), along with counters, tabletops, doorknobs, bathroom fixtures, toilets, keyboards, tablets and bedside tables.

The doctors recommended restriction on mobile phone usage in healthcare settings like hospital wards, ICUs and operation theatres, while advocating the use of headphones to prevent contact with the face while talking.

There should be no sharing of mobile phones, headphones or headsets of any kind. In addition, where available, the use of interdepartmental intercom facility may be promoted.

"Although hand hygiene and mobile phone use by a person are not mutually exclusive, it is high time to acknowledge the potential role of mobile phones in disease transmission cascade and to take evidence-based appropriate actions. This is especially important, given the ongoing COVID-19 pandemic," the authors said.

They said it is necessary for government agencies and the WHO to generate public awareness and to formulate suitable information, education and communication material on mobile phone hygiene, especially in healthcare settings.

AIIMS, New Delhi, Resident Doctors' Association (RDA) General Secretary, Dr Srinivas Rajkumar T said even outside health care settings, people should pay special attention to the usage of mobile phones as they carry them to all places.

"Phone and computer peripherals like keyboard, mouse, etc. should be covered with transparent plastic covers which can be cleaned without interfering with their function. Cleaning hands by soap or alcohol-based hand sanitizer before and after contact with phone and between contact with other surfaces can decrease the risk of potential transmission.

"Using a handsfree headset, dedicated operator/assistant per ward handling the communication via common line in hospitals while on duty can enable communication without compromising safety," Dr Srinivas said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 21,2020

Bengaluru, May 21: The COVID-19-induced lockdown saw a spurt in crybercrimes in India with Kerala recording the highest number during the period, according to an analysis of IT security solutions provider K7 Computing.

The report analyses various cyberattacks within India during the pandemic and reveals that threat actors targeted the States with COVID-19-themed attacks aimed at exploiting user trust.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level, the company said in a statement.

These attacks aimed to compromise computers and mobile devices to gain access to users confidential data, banking details and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users sensitive data.

Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better.

Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost six and four times the number of attacks, respectively, as Bengaluru users.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period, the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu at 184 attacks, the statement said.

A majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users, it said.

These attacks were aimed at heightening users fears and creating a sense of urgency to take action.

The report noted phishing attacks where scamsters posed as representatives of the United States Department of the Treasury, the World Health Organisation, and the Centres for Disease Control and Prevention.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus, it was stated.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.