IIA shuts down 
By Allie Coyne | Mar 24, 2014 | Comment Now 
Comms Alliance takes over operations.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
US refusing to budge on TPP issues 
By Juha Saarinen | Dec 9, 2013 | Comment Now 
Singapore conclusion uncertain.
 
'Most popular' torrent client laced with Android malware 
 
BitTorrent opens serverless P2P chat  
By Juha Saarinen | Oct 1, 2013 | Comment Now 
Sans central storage.
 
BitTorrent launches serverless secure P2P chat 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
 
IIA launches infosec industry coordination council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
IIA to launch national online security council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
IIA seeks election pledges for tech startups 
Aug 20, 2013 | Comment Now 
Politicians 'distracted' by mining, manufacturing.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws to drive class actions: IIA 
By Allie Coyne | Jun 4, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws will drive class actions: IIA 
By Allie Coyne | May 31, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
Microsoft cracks down on Windows 8 piracy in Melbourne 
 
Microsoft busts pirates in Melbourne markets 
By SC Australia Staff | Mar 26, 2013 | Comment Now 
Hawkers flog bootleg copies of Windows 8.
 
BitTorrent Live P2P broadcasting protocol now open beta 
 
US six-strikes anti-filesharing system kicks in 
By Juha Saarinen | Feb 26, 2013 | Comment Now 
Account terminations unlikely for repeat offenders.
 
Feds tip ACTA analysis by year end 
By Ry Crozier | Nov 29, 2012 | Comment Now 
Will they wait for copyright inquiry to conclude?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 481

Vote