Three-strikes laws do not reduce online piracy: study 
By Juha Saarinen | Sep 10, 2013 | Comment Now 
Copyright infringers seek other tools.
EMC, VMware named in cloud patent suit 
By Brett Winterford | Dec 12, 2011 | Comment Now 
Peer-to-peer entrepreneurs gamble on patent suit.
Aussie eyes Apple, Google over 'cloud' music patents 
By Brett Winterford | Jul 6, 2011 | Comment Now 
P2P pioneer uses Kazaa ruling to demand licence fees.
Stokes: Seven must adapt to illegal content sharing 
By Ry Crozier | Feb 10, 2010 | Comment Now 
Channel 7 considers "bringing broadcast windows forward".
iiTrial: Judgement Day (live coverage) 
By Brett Winterford | Feb 3, 2010 | Comment Now 
Live coverage from the Federal Court.
Day 22: Film studios target iiNet business model change 
By Ry Crozier | Nov 26, 2009 | Comment Now 
Previous cases support alteration.
myONE blocks peer-to-peer on "unlimited" broadband 
By Ry Crozier | Oct 28, 2009 | Comment Now 
Definitions called into question.
Kazaa goes legit 
By Shaun Nichols | Jul 21, 2009 | Comment Now 
P2P network re-launches as music service.
Enterprises beware: IM attacks break record, again 
By Dan Kaplan | Oct 31, 2006 | Comment Now 
The prevalence of instant messenger (IM) attacks has reached record numbers for the second consecutive month, an IM security firm announced this week.
KaZaa users warned of p2p worm 
By Frank Washkuch | Aug 1, 2006 | Comment Now 
Researchers are warning peer-to-peer (p2p) application users of a new proof-of-concept virus that acts similarly to the W97M/Melissa malware.
Most ISPs to limit P2P traffic 
By Tim Lohman | Mar 14, 2006 | Comment Now 
Up to 90 percent of fixed-line and 100 percent of wireless ISPs could be limiting peer to peer traffic by the end of the year, said network traffic optimisation vendor Allot ...
Kazaa applies for Anton Piller order to be set aside 
By Vivienne Fisher | Feb 11, 2004 | Comment Now 
An Australian recording industry body and Sharman Networks are in a legal wrangle, which centres around alleged copyright infringement relating to the use of the file-sharing ...
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats