NAB hesitant on Bitcoin, P2P lending 
By Allie Coyne | Jul 15, 2015 | Comment Now 
Would rather sit back and watch.
 
Apple files patent for Watch handshake payments 
Jul 7, 2015 | Comment Now 
Bumps and hugs will transfer funds.
 
ACCAN pushes for mobile app crackdown 
By Andrew Colley | Oct 9, 2014 | Comment Now 
Will work with states to monitor complaints.
 
Canberra's wi-fi network to block file sharing P2P traffic 
 
Google commences ‘right to be forgotten’ Euro tour 
Sep 10, 2014 | Comment Now 
Google-appointed panel to debate privacy rights.
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Apple buys Beats Music and Electronics 
By Juha Saarinen | May 29, 2014 | Comment Now 
In biggest ever acquisition.
 
Senate votes to protect domestic submarine cables 
By Allie Coyne | May 15, 2014 | Comment Now 
Turnbull's bill to be passed into law.
 
ISPs put on notice to fix the big issues 
By Ry Crozier | Jan 8, 2014 | Comment Now 
No longer enough to shower customers with service credits.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 8, 2013 | Comment Now 
Preventing fibre taps.
 
Senate to explore submarine cable security 
By Ry Crozier | Dec 6, 2013 | Comment Now 
Preventing fibre taps.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 693

Vote