Search Results for: twitter

Police, Prosecutors and Judiciary: Please Don’t Create Fake Laws out of your misinterpretation

When a Palghar girl posted a message on her Facebook raising a query …Why there should be Mumbai Bundh if Mr Bal Thakrey has died? and another Palghar girl clicked on “Like” button against the message, Police in Palghar moved … Continue reading

Posted in Cyber Law | 1 Comment

Fighting susceptibility for “Cyber Hypnotism” with Ulysses Contracts

The recent Cyber fraud in Mumbai where an elderly (72 year old)  woman was duped to the extent of Rs 42 lakhs in a Nigerian Scam (Refer here) open up a discussion on how it that  seemingly intelligent people fall … Continue reading

Posted in Cyber Law | Leave a comment

Redefining the scope of ITA 2008.. in the amendments..

This is the continuation of the discussions on the proposed amendments to ITA 2008 being considered by the T K Vishwanathan Committee.. Naavi The proposed amendments to ITA 2000/8 which may come out in the form of Information Technology Amendment … Continue reading

Posted in Cyber Law | Leave a comment

Suggestions on Modification of ITA 2008

There is an exercise going on in Delhi to modify ITA 2008. Last time when ITA 2000 was amended, the trigger was the Bazee.com case where the CEO of baazee.com (now ebay.in) was prosecuted under Section 85 of ITA 2000 … Continue reading

Posted in Cyber Law | 3 Comments

The Tesco Bank Attack..Yet another incident of Security Failure

The UK based Tesco Bank recently observed suspicious transactions in around  40000 Current Accounts and had to temporarily shut down transactions in the accounts. Subsequently it was indicated that about 9000 accounts saw fraudulent withdrawals to the total extent of … Continue reading

Posted in Cyber Law | Leave a comment

Chroma Key Morphing alleged in Hillary Clinton Video..A lesson for Cyber Forensic Specialists

Some time back, there was a lot of discussion in India about a video in JNU in which allegations that anti India slogans were raised. There were two versions of the video one in which there were clear indications that … Continue reading

Posted in Cyber Crime | Leave a comment