Tags: avsdaRemove, booksRemove, gamesRemove, p2pRemove, riaaRemove

Canberra's wi-fi network to block file sharing P2P traffic 
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
Google wins against authors in book scanning case 
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
 
Dotcom 'whitepaper' alleges corruption and dirty tricks 
By Juha Saarinen | May 8, 2013 | Comment Now 
Megaupload covered by DMCA safe harbour?
 
Pirate Bay founder hacking trial to start next month 
 
Pirate Bay founder hacking trial to start next month 
 
Watchdog goes after in-app purchases 
 
BitTorrent Live P2P broadcasting protocol now open beta 
 
Telstra links ADSL 'congestion pricing', deep packet trial 
By Ry Crozier | Feb 11, 2013 | Comment Now 
Three-prong attack on network congestion.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
BitTorrent invites broadcasters to trial Live streaming service 
 
Graduated response economics don't stack up: lawyer 
By Juha Saarinen | Sep 20, 2012 | Comment Now 
'Waste of money' with no effect on infringement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 432

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote