Canberra's wi-fi network to block file sharing P2P traffic 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
Google wins against authors in book scanning case 
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
 
Dotcom 'whitepaper' alleges corruption and dirty tricks 
By Juha Saarinen | May 8, 2013 | Comment Now 
Megaupload covered by DMCA safe harbour?
 
Pirate Bay founder hacking trial to start next month 
 
Pirate Bay founder hacking trial to start next month 
 
Watchdog goes after in-app purchases 
 
BitTorrent Live P2P broadcasting protocol now open beta 
 
Telstra links ADSL 'congestion pricing', deep packet trial 
By Ry Crozier | Feb 11, 2013 | Comment Now 
Three-prong attack on network congestion.
 
Google's win reflects internet-friendly High Court 
By John Hilvert | Feb 7, 2013 | Comment Now 
Analysis: Fact-probing High Court judges help Google triumph.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
BitTorrent invites broadcasters to trial Live streaming service 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1388

Vote