Tags: labelsRemove, limewireRemove

US Govt irked by MegaUpload's legal team 
By Liam Tung | Apr 16, 2012 | Comment Now 
Conflicts of interest?
LimeWire to pay record labels US$105m 
By Jonathan Stempel | May 14, 2011 | Comment Now 
Long-running lawsuit ends.
FTC closes probe into LimeWire inadvertent file sharing 
By Dan Kaplan | Aug 31, 2010 | Comment Now 
P2P site's security controls may have been vulnerable.
LimeWire facing takedown effort from RIAA 
By Shaun Nichols | Jun 8, 2010 | Comment Now 
Peer to peer provider will have two weeks to make its case.
LimeWire cited as identity theft attack vector 
By Iain Thomson | Aug 13, 2009 | Comment Now 
Another reason to block peer-to-peer.
LimeWire cited as identity theft attack vector 
By Iain Thomson | Aug 13, 2009 | Comment Now 
The use of LimeWire as a tool for identity theft has been highlighted by a court case in Seattle.
Limewire opens DRM-free music shop 
By Guy Dixon | Mar 20, 2008 | Comment Now 
Limewire has taken the wraps off its DRM-free music store, allowing users to acquire music downloads through a legitimate paid-for channel..
Record labels attack China's music biz 
By Simon Burns | Feb 7, 2008 | Comment Now 
China's music business is based on "blatant violation of copyright laws", a body representing major record labels has claimed.
Jobs blames record labels for DRM 
By Shaun Nichols | Feb 8, 2007 | Comment Now 
Apple chief says he would drop copy protection if he could.
Windows OneCare labels Gmail as malicous 
By Ericka Chickowski | Nov 15, 2006 | Comment Now 
Customers of Windows Live OneCare were advised by Microsoft this week to update their antivirus signature after the service began tagging Google's e-mail service as malicious.
Microsoft to share Zune profits with record labels 
By Tom Sanders | Nov 13, 2006 | Comment Now 
Manufacturer unveils self-imposed copyright levy.
The lights power the labels in Aussie supermarkets 
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats