Search Details

Word: hiltonization (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...boom since the local government ended a longstanding monopoly and opened the casino business to foreign investors in 2002. But the Cotai Strip takes the boom, and the city's glitz factor, to a whole new level. The first part of the project, slated for completion in 2007, includes Hilton, Marriott, Dorsett, Sheraton, InterContinental, Regal and Four Seasons hotels and casinos in addition to Adelson's own Venetian Macao. Besides more than doubling the number of hotel rooms in the city, the 1.3-km Cotai Strip's initial phase will boost entertainment and business facilities with an arena for concerts...

Author: /time Magazine | Title: Betting on the Strip | 3/21/2005 | See Source »

...phone owners to adopt the same precautions they should take with home computers: don't download unknown software or open suspicious messages, make certain passwords contain a mix of letters and numbers, and consider installing antivirus software. It might also be wise not to give your number to Paris Hilton...

Author: /time Magazine | Title: Paris Hilton's Hack Attack | 2/28/2005 | See Source »

...didn't already think the life of Paris Hilton was a cautionary tale, consider the events of last week. A hacker swiped revealing photos and celebrity phone numbers from the reality-TV star's mobile phone and posted them on the Web, forcing Hilton to apologize to friends and family for the invasion of privacy, and offering the rest of us a valuable lesson: your mobile phone is more vulnerable than you ever realized. "What you have in your hand is a small, powerful computer connected to a public network," says Aloysius Cheang of the Singapore-based information-security nonprofit...

Author: /time Magazine | Title: Paris Hilton's Hack Attack | 2/28/2005 | See Source »

...Hilton's phone-service provider T-Mobile hasn't revealed how her data was pilfered, but the news sets a scary precedent. While most of us aren't toting around numbers for Anna Kournikova or Eminem in our address book, phones are often used to store sensitive information, says Adam Laurie, chief security officer for the London-based security firm The Bunker?including PIN numbers, alarm codes, and even safe combinations that could be lifted by a determined hacker...

Author: /time Magazine | Title: Paris Hilton's Hack Attack | 2/28/2005 | See Source »

...Hilton's not alone. Some 400 T-Mobile customers were hacked, the company admitted. Just days before Hilton's exposure came to light, Nicholas Jacobsen, 22, pleaded guilty to computer fraud for hacking T-Mobile. He was nabbed in a government investigation of the Internet underworld. Jennifer Granick, executive director of Stanford University's Center for Internet and Society, says the ChoicePoint scam and T-Mobile hack "show that companies don't take seriously the need to keep our information safe." The solution? Don't store any truly sensitive information on a wireless device and, when possible, disable wireless features...

Author: /time Magazine | Title: A New Kind of Hack Attack | 2/27/2005 | See Source »

Previous | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | Next