Mumbai-bound Air India flight grounded at Dubai airport due to technical reasons

Agencies
November 12,2019

New Delhi, Nov 12: An Air India Boeing 787 Dreamliner aircraft operating from Dubai to Mumbai returned to Dubai airport after an hour due to technical reasons and was grounded on Tuesday.

"There is a minor technical issue and it will only take one to two hours to rectify the issue. But since safety is our first priority, the flight has returned to Dubai. Necessary material and technical team has already been sent to Dubai and the flight will take off at approximate 10 pm (local time)," Air India spokesperson Dhananjay Kumar told ANI.

A total of 244 passengers were on board the flight and were deplaned safely at Dubai airport as per standard operating procedure (SOP). Air India has provided accommodation and food to all the passengers.

Kumar said that the flight will take some time to be in operation because a team, along with required material will fly from India to Dubai, and will only start work after clearance from customs and security at the airport there.

According to sources, there was a glitch in the supply of air inside the aircraft.

The Air India flight was airborne on time around 4 am early in the morning today but some errors were detected in the air pressure maintenance system after an hour. The pilot immediately decided to return to Dubai airport, airlines sources added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.

Man attacked with hammer by saffron extremists while transporting meat, cops watch

coastaldigest.com web desk
August 1,2020

New Delhi, July 1: In a terrific incident with chilling echoes of the 2015 Dadri mob lynching, a Muslim man, who was carrying meat, was savagely attacked by a mob belonging to a saffron outfit in the presence of in BJP ruled Haryana on the eve of Eid al-Adha. 

The incident occurred at around 9 a.m. on Friday, July 31 at Badshahpur village in Haryana’s Gurgaon, when Lukman was transporting meat in a pic-kup truck. 

The attack was captured on mobile phones by onlookers and the video clips of the incident are now spreading on social media. 

A group of saffronite cow vigilantes chased the truck for about 8 km managed waylay it. Lukman, who was driving the truck was pulled out and brutally assaulted on the suspicion that he was transporting cow meat.

Just like Dadri, the police were faster at sending the meat to a lab for testing than catching any one of the suspects. One of the assailants - Pradeep Yadav- has been arrested. 

After being beating to an inch of his life, Lukman was bundled into the pick-up truck and taken back to Gurgaon's Badshahpur village where the goons started thrashing him again.

This is when the police stepped in and stopped them - only to find the assailants fearless enough to even take on them.

Lukman was taken to a hospital and the police filed a case against "unidentified individuals" even though the video of the incident recorded by witnesses shows the faces of the assailants.

The owner of the vehicles said that the meat was buffalo and he has been in the business for 50 years.

The police have so far refused to give a statement on record on the incident and explain their inaction as seen on video.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.

Twitter apologises for mega crypto hack, says it is embarrassed and disappointed

Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.

With highest single-day spike of 28,637 cases, India's COVID-19 tally reaches 8,49,553

News Network
July 12,2020

New Delhi, Jul 12: With the highest single-day spike of 28,637 new cases and 551 deaths being reported in the last 24 hours, India's COVID-19 count reached 8,49,553 on Sunday.

According to the Union Health and Family Welfare Ministry, this includes 2,92,258 active cases, and 5,34,621 cured and discharged or migrated patients. The toll due to the disease has reached 22,674 in the country.

Maharashtra with 2,46,600 cases continues to be the worst affected state by COVID-19 in the country. The state has 99,499 active cases while 1,36,985 patients have been cured and discharged so far. The death toll due to the disease now stands at 10,116.

Tamil Nadu with 1,34,226 cases, including 46,413 active ones, is the next worst affected in the country. While the number of cured and discharged patients is at 85,915 in the state, the toll due to the disease is at 1,898.

The national capital has recorded 1,10,921 confirmed cases so far. However, the number of active cases in Delhi is at 19,895 and 87,692 patients have been cured and discharged so far. With 3,334 deaths being reported due to COVID-19 in the city. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.