BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
 
Pirate Bay founder hacking trial to start next month 
 
Pirate Bay founder hacking trial to start next month 
 
BitTorrent Live P2P broadcasting protocol now open beta 
 
Telstra links ADSL 'congestion pricing', deep packet trial 
By Ry Crozier | Feb 11, 2013 | Comment Now 
Three-prong attack on network congestion.
 
Google's win reflects internet-friendly High Court 
By John Hilvert | Feb 7, 2013 | Comment Now 
Analysis: Fact-probing High Court judges help Google triumph.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Telstra fears IP rules will kill off NBN ideas forum 
By Ry Crozier | Jan 30, 2013 | Comment Now 
No incentive to participate?
 
BitTorrent invites broadcasters to trial Live streaming service 
 
Microsoft-Google trial raises secrecy concerns 
By Dan Levine | Nov 5, 2012 | Comment Now 
Tech vendors sealing everything from view in public courtrooms.
 
Geo-block escapes putting pinch on content owners 
By Chris Jager | Nov 1, 2012 | Comment Now 
Competition watchdog says users have power to improve IT pricing, access to products.
 
Copyright talks could lapse, parties warn 
By James Hutchinson | Oct 11, 2012 | Comment Now 
Will an industry code eventuate?
 
Graduated response economics don't stack up: lawyer 
By Juha Saarinen | Sep 20, 2012 | Comment Now 
'Waste of money' with no effect on infringement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 575

Vote