Twitter launches dedicated search prompt to curb domestic violence in India

Agencies
June 17, 2020

In a bid to help tackle rise in domestic violence during the social distancing times in India, Twitter on Wednesday launched a dedicated search prompt to serve information and updates from authoritative sources around domestic violence.

Twitter has partnered with the Ministry of Women and Child Development the National Commission for Women in India to expand its efforts towards women.

The search prompt will be available on iOS, Android and on mobile.twitter.com in India, in both English and Hindi languages, the company said in a statement.

Data shows that since the outbreak of Covid-19, violence against women and girls has intensified in India and across the globe.

"We recognise collaboration with the public, government and NGOs is key to combating the complex issue of domestic violence. Accessing reliable information through this search prompt could be a survivor's first step towards seeking help against abuse and violence," said Mahima Kaul, Director, Public Policy, India and South Asia, Twitter.

Every time someone searches for certain keywords associated with the issue of domestic violence, a prompt will direct them to the relevant information and sources of help available on Twitter.

This is an expansion of Twitter's #ThereIsHelp prompt, which was specifically put in place for the public to find clear, credible information on critical issues.

The feature will be reviewed at regular intervals by the Twitter team to ensure that all related keywords generate the proactive search prompt, said the company.

Violence against women and girls across Asia Pacific is pervasive but at the same time widely under reported.

"In fact, in many countries in our region, the number is even greater, with as many as 2 out of 3 women in some countries reporting experiences of violence," added Melissa Alvarado, UN Women Asia Pacific Regional Manager on Ending Violence against Women.

Rekha Sharma, Chairperson, the NCW, said: "With social distancing norms in place, several women are unable to contact their regular support systems. This initiative by Twitter will provide big support to the survivors, who would otherwise be easily isolated without access to relevant information and help".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

New Delhi, Mar 8: In order to spread awareness, a special COVID-19 mobile phone caller tune was launched by all telecom operators with basic infection prevention messages played when a caller dials-out, Ministry of Health and Family Welfare said on Saturday.

"In order to spread awareness about COVID-19, a special COVID-19 mobile phone caller tune was launched by all telecom operators. Over 117.2 crore subscribers of BSNL, MTNL Reliance Jio, Airtel and Vodafone-Idea are being progressively reached out to through SMSs and Call Backs," Ministry of Health and Family Welfare said in a press statement.

"As many as 52 laboratories are now operational across the country for testing the COVID-19 virus. An additional 57 laboratories have been provided with Viral Transport Media and swabs for sample collection," the statement added.

India has 39 confirmed cases of deadly coronavirus so far. The disease has caused deaths of 3200 people globally. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 22,2020

Chennai, Jun 22: Commuting the death sentence to life imprisonment for five convicts, the Madras High Court on Monday set free Chinnasamy, the main convict, who had also been sentenced to death in the Udumalpet Shankar honour killing case.

A Division Bench comprising Justice M. Sathyanarayanan and Justice M. Nirmal Kumar also dismissed the appeal by the state police against the acquittal of three persons by a lower court.

The Bench ordered the five convicts sentenced for life to undergo a jail term of not less than 25 years.

In 2016, V. Shankar, who had married C. Kausalya, was killed by a gang in Udumalpet in Tamil Nadu. The gang also injured Kausalya in the attack.

It was alleged the parents of Kausalya -- Chinnasamy, Annalakshmi -- were against the marriage.

P. Pandidurai, the uncle of Kausalya at the behest of Chinnasamy and Annalakshmi had hired a gang to kill Shankar.

The gang killed Shankar in broad daylight in a public place and Kausalya too got injured in the attack as she tried to save her husband.

The Principal District and Sessions Court in Tiruppur had convicted and sentenced to death six accused persons -- Chinnasamy, P. Jagadeesan, P. Selvakumar, M. Manikandan, M. Mathan alias Michael and P. Kalaithamilvaanan.

The court also sentenced two other accused, K. Dhanraj for life and Manikandan to a five year jail term, while acquitting Annalakshmi, Pandidurai and Prasanna.

The convicts had filed an appeal against their sentence in the Madras High Court while the police filed an appeal against the acquittal of three persons.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.