Search Details

Word: breaches (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...networks for Social Security numbers, banking information and other data that could be used for potential identity theft. One recent example: officials at the University of California, Berkeley, said in May that hackers stole the Social Security numbers of 97,000 students, alumni and others during a six-month breach of the school's computer system. Other computer vandals have caused physical harm. A forum run by the Epilepsy Foundation had to be shut down last year after online intruders, in perhaps the nastiest prank yet, led visitors to sites featuring bright, flashing images known to potentially trigger seizures...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

...Iran, however, is not currently in the process of directly hijacking an election. The Saudi bribes are also a breach of Lebanese electoral laws, which forbid the outright purchasing of votes and place a cap on the spending of candidates in the two months prior to an election...

Author: By The Crimson Staff | Title: Not for Sale | 5/5/2009 | See Source »

...Mail2World’s client carries greater weight when it comes to maintaining privacy and reliability since a failure to accommodate a prestigious university could discourage other colleges to outsource e-mail services to Mail2World.Mason, the company’s spokeswoman, says that Mail2World has never had a privacy breach. Data such as a user’s name, password, and e-mail messages are given the distinction of “personal private information,” which is protected by a password that, according to Mason, is only known to two people within the company.Mason also says that...

Author: By Naveen N. Srivatsa, CONTRIBUTING WRITER | Title: E-mail Switch Draws Security Concerns | 5/1/2009 | See Source »

...political suspense film: Matthew Michael Carnahan, who wrote The Kingdom (G-men in a middle East war) and Lions for Lambs (handwringing over Afghanistan); Tony Gilroy, of Michael Clayton and Bourne movie fame; and Billy Ray, who did the magazine-corruption film Shattered Glass and the CIA exposé Breach. When a trio of top names is on a script, you can guess that each worked consecutively on the material, trying to slim it down or punch it up; and that each was employed to fix the "improvements" the previous man had made. It's been reported that Brad Pitt...

Author: /time Magazine | Title: State of Play: Better on the Small Screen | 4/17/2009 | See Source »

Kingzio, Jerome Kenneth • sentencing of to three weeks in prison for serious breach of in-flight etiquette consisting of drunkenly arising from his seat behind a 66-year-old passenger who was watching the in-flight movie and urinating...

Author: /time Magazine | Title: Paul Slansky's Weekly Index of the News | 4/17/2009 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | Next