BitTorrent Sites Show Explosive Growth

BitTorrent's popularity is growing every day. Despite efforts from anti-piracy outfits such as the MPAA and IFPI, torrent sites continue to grow traffic wise, and there is no sign that this trend will be brought to a halt anytime soon.

Get BitTorrent on Your TV with Myka

Until recently, if you've wanted to play videos you've downloaded on your TV, you either needed to hook it to your PC, buy an AppleTV, or use an Xbox. Now, one company aims to add another option - one which can get the videos itself, via BitTorrent.

German Court Decision Hands Big Win to File-Sharers

The Federal Constitutional Court in Germany has ruled that the identities of file-sharers must remain private and can no longer be revealed to media companies who accuse them of copyright infringement. In future, only those accused of 'heavy' crimes such as murder, child pornography or kidnapping will be revealed.

Publisher Posts Mac Books on The Pirate Bay

No Starch Press and Wired's news editor Leander Kahney have released free copies of "The Cult of Mac" and "The Cult of iPod" on the Pirate Bay. Publishing music, movies and books on BitTorrent seems to be becoming a trend, and there's nothing wrong with that.

The Pirate Bay to BBC: We Don’t Want To Be Information Slaves

The BBC has published a podcast which takes a look at piracy through the ages, also covering the modern concept of 'intellectual property'. Of course, no story of piracy would be complete without discussing The Pirate Bay so Peter Sunde also plays a significant part in this 20 minute program.

CBC To Release TV-Show via BitTorrent, For Free

CBC, Canada's public television broadcaster has plans to release the upcoming TV-show "Canada's Next Great Prime Minister" for free via BitTorrent. This makes CBC the first North-American broadcaster to embrace the popular filesharing protocol.

VLC Player Vulnerable to Remote Hijack

VLC Player, one of the best and most widely used media players has found to be vulnerable to a remote hijack. The reported vulnerability makes it possible for a malicious user to run arbitrary code, potentially taking remote control of the host machine.