Tags: avsdaRemove, gamesRemove, ifpiRemove, ipRemove, p2pRemove, riaaRemove

ASIC admits to lack of technical knowledge in s313 use 
By Allie Coyne | Aug 27, 2014 | Comment Now 
Wants to retain use of website blocking notices.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
US, ICANN face opposition over transfer of internet address control 
Apr 3, 2014 | Comment Now 
Republicans want protections from foreign govt intrusion.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
French court shuts down video streaming websites 
Dec 2, 2013 | Comment Now 
Search engines, ISPs forced to block access to 16 services.
 
Apple wins US$290m from Samsung in patent retrial 
By Dan Levine | Nov 22, 2013 | Comment Now 
Apple takes this round in smartphone war.
 
TPP leak reveals hardline US position on IP 
By Juha Saarinen | Nov 14, 2013 | Comment Now 
Australian delegation sides with the US.
 
Telstra makes signal control changes in IP core 
By Ry Crozier | Nov 8, 2013 | Comment Now 
Brought on by 4G rollout.
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Anonymous members indicted for #OpPayback 
 
Anonymous hackers indicted for Operation Payback 
By Juha Saarinen | Oct 4, 2013 | Comment Now 
Encouraged others to join in on DDoS.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Salesforce.com to speed up login process 
By Ry Crozier | Sep 18, 2013 | Comment Now 
Only Tokyo data centre left out.
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1001

Vote