Latest News
In Pictures: NEXTDC & Vocus AI infrastructure roundtable
Actor auth tokens gave Global Admin access across Azure Entra ID tenants
Kmart Australia's use of facial recognition breached privacy
NSW gov third party-linked cyber incidents quadruple in two years
FileFix attack tricks users into running image-borne malware
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
p2p
p2p
Illegal P2P costing business $60m
Illegal P2P downloads are costing Australian businesses up to $60 million a year, according to a study prepared by Exinda Networks.
Staff Writers
Oct 25 2004 12:00AM
Security
Websense says P2P sites soared fivefold in 2003
The numbers of peer-to-peer (P2P) websites and services increased fivefold during 2003, according to research from Websense, the employee internet management specialist.
Steve Gold
Mar 30 2004 4:37PM
Security
Hackers Turn To P2P Resources For Attack Vectors
A freely available peer-to-peer (P2P) hacking tool has become the weapon of choice for many hackers looking to take control of users' PCs.
Steve Gold
Mar 18 2004 2:53PM
Security
Previous
Most popular tech stories
Lendi Group unveils agentic AI-powered home loan 'guardian'
UNSW to offer ChatGPT Edu to 10,000 staff
Medibank targets central system to handle people queries
Queensland Rail uses SuccessFactors to "put learning back on the map"
APT Travel Group grows online sales 175% with Contentful-powered digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry comes together to explore IoT opportunities
Sydney and Melbourne rank highly for "citizen experience"
Govt launches consumer tech label program for smart devices
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?