April 30, 2019

Along with the many gains that come with going cashless today,  financial digitisation also gives way to a massive influx of cyber crime. The upsurge in fraudulent transactions and security threats have posed a serious challenge to central banks and clearing houses. According to data breach statistics, 267,088 data records are lost or stolen every hour. Only 4% of the total breaches committed since 2013 were “secure breaches” where encryption was used which rendered the  stolen data useless. The social media industry suffered the greatest impact, accounting for 56.18% of the total compromised records in 2018. Identity theft has been the most prevalent breach type since 2013...

August 21, 2018

This hasn’t been a great year for Intel so far, case in point all the speculation concerning a security flaw in its processors.‘Foreshadow’, or L1TF (Terminal Fault) is a security vulnerability that takes advantage of a feature called Speculative Execution. It was first discovered by two sets of researchers in January 2018.Two security threats Meltdown and Spectre had caused lots of trouble to the company earlier this year, and this new one is somewhat similar to them. Speculative execution is widely used in most modern processors to enhance performance. The concept requires assuming succeeding instructions, instead of waiting for the previous one to be executed. If the pre...

May 1, 2018

With majority of news channels and other media largely targeting and blaming Facebook for the entire scandal, it isn’t really unwise to talk about the other side of the story. Facebook continues to insist that all the data that was ‘inappropriately’ used to collected from the users with their explicit consent. Kogan’s app “thisisyourdigitallife” was launched as his personal project and Facebook users ‘willingly’ gave up their personal data to the app, not knowing what the consequences were going to be. Zuckerberg did argue that Cambridge Analytica was warned to delete all the inappropriately obtained user data and not to use it, but the blunder that they made was to think t...

May 1, 2018

The Facebook-Cambridge Analytica data scandal has put billions of Facebook users into deep concern on the issues of data privacy and security, given the enormous potential that lies in the data, and given that they are living in the so called Data-era wherein everything from a company’s Business model to data-hungry ML algorithms used in variety of fields from predictive analyses to deep learning techniques depends on user data sets and patterns as raw input to bring out commercially remunerative outcomes for businesses and a personalised experience for the users. Let’s have a brief recap of the scandal that took a major share of the news for the past month, caused Facebook...

April 11, 2018

In the present technological era, information plays a vital role and a critical asset which should be protected. Cryptography has always been the first choice for the security solution to protect the information. It is a technique for changing over plaintext into some code, known as ciphertext, which the third party can’t decrypt easily. The cryptographic information is secure, however, decryption of data at the destination end, the complete integrity of the data and availability of the data when needed are three vital aspects of cryptography. In the view of these three aspects a few methods, protocols and security standards should be followed to protect the information ove...

December 8, 2016

The biggest IP story this week was the December 6 Supreme Court decision in Samsung Electronics Co. v. Apple, a long fought battle over Samsung's infringement on three utility patents and three design patents owned by Apple. In its first design patent case of this nature in 120 years, Supreme Court's decision not only vacated the lower court's $399 million dollar damages verdict for Apple, asking the parties to go back to the drawing board for a better damages model, but also set a far reaching precedent for design patents in general.

Samsung and Apple first went to war in April 2011 in the U.S. District Court for the Northern District of California, when Apple accused Samsu...

October 21, 2016

The pendulum against covered business methods and software continues to swing backward or forward depending on whom you ask. Patent litigation statistics from 2014 and 2015 show that patent litigation on the whole decreased by over 13% - while NPEs in general increased their share of filings in the last year. America Invents Act and Alice-related decisions failed to rein in the number of case filings, contrary to knee-jerk public opinion.

However, one effect the America Invents Act and Alice did have is that plaintiffs, especially NPEs, find it increasingly difficult to successfully argue broad infringement reads. At the same time, plaintiffs are also required to furnish inc...

Please reload

Please reload

Topics