Category: Uncategorized

  • Blog
  • Category: Uncategorized
Application Security Intelligence Report for September 2019
Application Security Intelligence Report for September 2019
Application Security Intelligence Report for September 2019
Application Security Intelligence Report for September 2019

Application Security Intelligence Report for September 2019

In September, total cyberattacks increased by 40 percent compared to August, according to the Contrast Labs September 2019 AppSec Intelligence Report. The Three Most Common Attack Types in September SQL InjectionSQL injection involves carefully crafted inputs that manipulate an application’s SQL queries to steal data or execute malicious code. Cross-Site Scripting (XSS)XSS attacks inject malicious

New Concepts in Trademark Jurisprudence

  The rise of internet domain name disputes has presented unprecedented legal challenges, compelling courts across various jurisdictions to repeatedly address and resolve novel issues. In the process, several new legal concepts have emerged, significantly enriching trademark jurisprudence. Some of the most notable concepts are discussed below. 1. Cyberquatting Cyberquatting refers to the bad-faith registration

Cyber Laws in India

Life today is no longer limited to the physical or territorial world—we are equally a part of the virtual world. Digital technology and modern communication systems have brought dramatic changes to our daily lives. Living in a country with a population of over a billion is already challenging, and it becomes even more complex when

Why punishment under section 66A of IT Act 2000 is unconstitutional?

Freedom of Speech and the Unconstitutionality of Section 66A of the IT Act The Preamble of the Constitution of India guarantees Liberty—including the liberty of thought and expression—to all citizens. This foundational principle is protected under Article 19(1)(a) of the Constitution, which guarantees every citizen the right to freedom of speech and expression. This right

Need Help?