Destined to repeat past copyright mistakes 
By Juha Saarinen | Feb 18, 2014 | Comment Now 
Opinion: The Internet is for copying.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Britain sets out new rules for peer-to-peer lenders 
Oct 4, 2013 | Comment Now 
Seeks to protect crowdfunding borrowers.
 
White hats exploit flaw to sinkhole leviathan click fraud botnet 
 
Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
 
Denial of service attack downs Dotcom's Mega 
 
Pirate Bay founder hacking trial to start next month 
 
Pirate Bay founder hacking trial to start next month 
 
BitTorrent Live P2P broadcasting protocol now open beta 
 
US six-strikes anti-filesharing system kicks in 
By Juha Saarinen | Feb 26, 2013 | Comment Now 
Account terminations unlikely for repeat offenders.
 
Telstra links ADSL 'congestion pricing', deep packet trial 
By Ry Crozier | Feb 11, 2013 | Comment Now 
Three-prong attack on network congestion.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Dotcom's new site not revenge for Megaupload saga 
By Juha Saarinen, Naomi Tajitsu | Jan 21, 2013 | Comment Now 
Mega.co.nz collapses soon after launch.
 
BitTorrent invites broadcasters to trial Live streaming service 
 
Megaupload founder eyes file-sharing sequel 
By Naomi Tajitsu | Nov 2, 2012 | Comment Now 
Content to be encrypted.
 
Graduated response economics don't stack up: lawyer 
By Juha Saarinen | Sep 20, 2012 | Comment Now 
'Waste of money' with no effect on infringement.
 
Australians using BitTorrent less: study 
By James Hutchinson, Juha Saarinen | Sep 12, 2012 | Comment Now 
Are iiTrial, content convenience to blame?
 
NICTA P2P spin-off targets games, collaboration apps 
By Juha Saarinen | May 11, 2012 | Comment Now 
Spin-off gains $2m venture funding.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 768

Vote