Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
iiNet urges consumers to lobby govt on piracy changes 
By Allie Coyne | Jun 10, 2014 | Comment Now 
No to website blocking, graduated warning.
 
Tens of thousands flock to malware laden GTA V PC releases 
 
Grand Theft Auto V 'leaked' to bittorrent 
 
Pirate Bay founder hacking trial to start next month 
 
Pirate Bay founder hacking trial to start next month 
 
Microsoft cracks down on Windows 8 piracy in Melbourne 
 
Microsoft busts pirates in Melbourne markets 
By SC Australia Staff | Mar 26, 2013 | Comment Now 
Hawkers flog bootleg copies of Windows 8.
 
More torrent sites blocked in UK, Ireland 
By Juha Saarinen | Oct 25, 2012 | Comment Now 
Efficacy of blocking debated.
 
Ukraine police shut down torrent tracker Demonoid 
 
EU backs Google privacy policy 'pause' 
By Liam Tung | Feb 6, 2012 | Comment Now 
Respect our laws, says Justice Commissioner.
 
Woolworths stumps up 5GB in mobile overhaul 
By Ry Crozier | Oct 7, 2011 | Comment Now 
Everyday Mobile to be replaced.
 
Friday funny: Kiwis cower in fear of SkyNet 
Apr 15, 2011 | Comment Now 
Jules Verne, Leonardo Da Vinci conjured during New Zealand's 'three strikes' debate.
 
Manhole covers: A walking history of Australia's telecoms 
Dec 20, 2010 | Comment Now 
iTnews takes a walking history tour of Australian telecommunications using manhole covers located across Sydney. Have you seen an NBN Co cover yet?
 
Koobface servers closed down 
By Tom Brewster | Nov 18, 2010 | Comment Now 
UK hosting company suspends service.
 
Geocities becomes 652GB torrent 
Nov 1, 2010 | Comment Now 
Slice of web history saved.
 
Telstra's long road to customer satisfaction 
By David Havyatt | Oct 29, 2010 | Comment Now 
Opinion: When everything old is new again.
 
US takes aim at offshore torrent sites 
By Liam Tung | Sep 22, 2010 | Comment Now 
Includes domain registrars.
 
Close encounters with ancient history 
By Lysa Myers | Sep 16, 2010 | Comment Now 
West Coast Labs' Lysa Myers says that you can't create a filter to screen out human gullibility.
 
Blog platform shut down after terrorist postings 
By Dan Raywood | Jul 21, 2010 | Comment Now 
Bomb-making instructions posted.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1015

Vote