• Free Consultation
  • Free IP Audit
  • International Brand Protection
  • About
  • Careers
  • Global IP Blogs
  • Contact
  • Login
Lexprotector.com
+1 – 888 890 6411 [email protected]
  • Trademark
    • Trademark Search
      • Indian Trademark Search
      • USA Trademark Search
      • EU Trademark Search
      • UK Trademark Search
      • Canada Trademark Search
      • Australia Trademark Search
      • New Zealand Trademark Search
    • Trademark Registration
      • Indian Trademark Registration
      • USA Trademark Registration
      • EU Trademark Registration
      • UK Trademark Registration
      • Canada Trademark Registration
      • Australia Trademark Registration
      • New Zealand Trademark Registration
    • Trademark Monitoring
      • Indian Trademark Monitoring
      • USA Trademark Monitoring
      • EU Trademark Monitoring
      • UK Trademark Monitoring
      • Canada Trademark Monitoring
      • Australia Trademark Monitoring
      • New Zealand Trademark Monitoring
    • Trademark Consultation
      • Indian Trademark Consultation
      • USA Trademark Consultation
      • EU Trademark Consultation
      • UK Trademark Consultation
      • Canada Trademark Consultation
      • Australia Trademark Consultation
      • New Zealand Trademark Consultation
  • Patent
    • Patent Search
      • Prior Art Search
      • Freedom to Operate Search
      • Utility Patent Search
    • Patent Drafting
      • USA Provisional Patent Drafting
      • USA Non-Provisional Patent Drafting
      • Indian Provisional Patent Drafting
      • Indian Complete Specification Drafting
    • Patent Filing
      • USA Provisional Patent Filing
      • USA Non-Provisional Patent Filing
      • Indian Provisional Patent Filing
      • Indian Complete Specification Filing
    • Patent Consultation
      • Patent Consultation
      • Utility Patent Consultation
      • Design Patent Consultation
    • Design Patent
      • Design Patent Search
      • EU Design Patent Filing
      • USA Design Patent Filing
      • India Industrial Design Filing
  • IP Enforcement
    • Violation Search
    • DMCA Takedown Notice
    • IP Enforcement
      • Copyright Enforcement
      • Trademark Enforcement
      • Utility Patent Enforcement
      • Design Patent Enforcement
    • Amazon Brand Registration
    • Copyright Registration
      • Indian Copyright Registration
      • USA Copyright Registration
  • IP Management
    • IP Due Diligence
    • IP Auditing
    • IP Valuation
    • IP Licensing
    • IP Consultation
+1 – 888 890 6411 [email protected]

Are You In The Cloud??

  • Older
  • Newer

Are You In The Cloud??

Written By: Lipsa Dash

The rece1nt outrageous news about leakage of several private pictures of Jennifer Lawrence, the Oscar winning actress, popular for being the lead star in Hollywood Blockbusters like Silver Lining Playbook and The Hunger Games, on certain image sharing forums has stirred-up the hornet’s nest. Hollywood and Music celebrities have become vulnerable to such audacious activities in the recent past more often than before. A Sports model, Kate Upton also found himself in a mess due to leak of some pictures last August on iCloud. If such reports are to be trusted, stats reveal, that Jennifer is the 101th Celeb that has been the victim of leaked pictures after Rihanna, Nickelodeon star Victoria Justice, Ariana Grande, Hillary Duff, Selena Gomez, Kim Kardashian and many others.

The aftermath of the incident is that Apple has fixed a bug in its “Find My iPhone” software that may have allowed hackers to gain access to the celebrity icloud accounts. Owen Williams from technology site The Next Web, who discovered the bug, said: “The Python script found on GitHub appears to have allowed a malicious user to repeatedly guess passwords on Apple’s ‘Find my iPhone’ service without alerting the user or locking out the attacker…” While on the other hand, Apple’s CEO denied any kind of defect in the icloud portal and categorized the leak “a result of normal, everyday web mischief…” Though latter accepted making certain changes in its privacy policy, only time will tell if it’s gonna work effectively or not.

When it comes to a person’s private life, his privacy is the most important part of his/her personal liberty irrespective of his/her being a common man or a public figure. The gravity of issue may vary in both the cases, but the consequences remain the same. Inadequate level of protection coupled with growing popularity of interne2t gives offenders a lucrative opportunity to play with someone’s private affairs. This leads to loss of personal data and effectively make people believe, like in Jennifer’s case, that nothing can remain private on the net-space. At this stage, we can only suggest that every individual should have the right to control their personal information from reaching to third party and it’s high time that law should come for the rescue. The increase in cyber interface is like a space without limits, which prevents a specific law to be inculcated, and needs to be amended with the latest developments happening in the digital space. It’s high time that jurisdictions regulating trans-border data flows are meticulously drafted to deter such activities. Countries should come up with stringent measures to control activities that are awful and harassing.

For more Information, contact Lex Protector. ')}

Quick Are You In The Cloud??