Microsoft invited Google to Novell patent feast 
By Liam Tung | Aug 8, 2011 | Comment Now 
Google didn't fall for it.
 
Apple chief patent lawyer leaving 
 
Critics brand internet piracy report a 'translation' job 
By Liam Tung | Mar 17, 2011 | Comment Now 
After Attorney General quoted from it.
 
US wrongly suspends 84,000 websites 
By Liam Tung | Feb 17, 2011 | Comment Now 
Bungled action sacrifices free speech in pursuit of child abusers.
 
Anti-piracy lawyer's finances leaked 
By Liam Tung | Sep 27, 2010 | Comment Now 
Settlements up to $1154 an allegation.
 
Assange ditches top Swedish defence lawyer 
By Liam Tung | Sep 8, 2010 | Comment Now 
Too difficult to contact?
 
Developer rages against Pirate Bay crack 
Aug 26, 2010 | Comment Now 
Smart coder urges users to laugh at cracker's poor skills.
 
US lawyer seeks to ban GTA 4 
By Iain Thomson | Sep 21, 2007 | Comment Now 
US lawyer Jack Thompson has threatened to sue Take2 Interactive in an attempt to prevent the release of Grand Theft Auto 4 after claiming that one of the characters in the game ...
 
Google bristles at Microsoft lawyer speech 
By Shaun Nichols | Mar 8, 2007 | Comment Now 
Search giant accused of committing huge copyright infringement.
 
Poor wireless security 'a liability' warns lawyer 
By RenĂ© Millman | Feb 13, 2006 | Comment Now 
Companies leave themselves open to legal threats if they fail to secure employee's laptops against wireless hackers in public hotspots, according to a London law firm.
 
Lawyer offers tips to companies for avoiding RIAA lawsuits  
By Illena Armstrong | Jan 20, 2004 | Comment Now 
With groups from both the recording and motion picture industries still threatening to file lawsuits against businesses for their employees’ downloading habits, organizations ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 718

Vote