Tata Sky Ltd. v. YouTube LLC

The Cyber Blog IndiaCase Summary

Tata Sky Ltd. v. YouTube LLC

 Tata Sky Ltd. v. YouTube LLC In the High Court of Delhi CS (COMM) 223/2016 Before Justice S. Muralidhar Decided on August 10, 2016 Relevancy of the case: Removal of offensive URLs from YouTube. Statutes and Provisions Involved The Information … Read More

Sabu Mathew George v. Union of India (May 2015)

Sammed AkiwateCase Summary

Sabu Mathew George v. Union of India

Sabu Mathew George v. Union of India In the Supreme Court of India WP(C) 341/2008 Before Justice Dipak Misra & Justice Prafulla C. Pant Decided on May 12, 2015 Relevancy of the case: Blocking advertisements related to preconception and prenatal … Read More

Right to be forgotten surfaces in India

Nitish ChandanLaw

The Right to be forgotten as the name suggests is a right that enables people to have something about them be forgotten. Alternatively, to be removed from the public domain. There could so much information about you on the Internet. … Read More

How to get Revenge Porn videos removed?

Nitish ChandanCyber Security, Law

revenge porn, social media, TheCBI, cybercrime, pornography, cyberspace

This post about Revenge Porn is based on the queries that we receive from numerous people across the country. And honestly, we did not have a clear answer  about revenge porn removal until we did some digging. First of all, … Read More

Hummingbad Malware: Have you heard of it?

Rachiyta JainCyber Security

According to the Kaspersky labs, there are 315,000 new viruses being created daily. Adding to this figure, in February this year, researchers from CheckPoint software technologies identified a new malware and named it as the Hummingbad Malware. It is an adware, … Read More

UwS: What is it & How does it get on my Computer?

Arpan SinhaCyber Security

UwS (pronounced as “ooze”) is an unwanted software, which according to Google’s defining list of characteristics has the following properties: It deceivingly promises something which it never meets. It tricks the user to install itself, or some other program. It … Read More

Replace OTPs with USB Security key

Arpan SinhaCyber Security

Security key

Two-factor authentication provides an extra layer of security to your account. It provides a method of combining two different kinds of login approaches to add some extra security, but that’s not enough. 2FA is stronger than password-based authentication, but it … Read More