Search Details

Word: phoning (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...TIME Mobile, now you can read Quotes of the Day from TIME.com on the Web browser of your cell phone. Go to mobile.time.com

Author: /time Magazine | Title: Verbatim: Dec. 18, 2006 | 12/10/2006 | See Source »

...Such monitoring can then determine whether a certain customer needs a higher level of security, like a token or an RFID tag. "Some of the most advanced technology we're seeing is those tokens being embedded in something that a consumer is carrying every day, such as a cell phone or credit card," says cybersecurity expert Fran Rosch of VeriSign, a leader in online authentication. "That makes it less likely to be lost." Less likely, but not impossible...

Author: /time Magazine | Title: Change Agent: Telltale Fingertips | 12/10/2006 | See Source »

...chain. "We have hacked into every single online banking application that we've tested, except one," says Stickley. So even if you follow all the rules--never respond to an e-mail purporting to be from a bank, shred every piece of paper containing personal information, only return a phone call to a financial institution using the number on the back of your card--you could still have an account cleaned out because of sloppy security at your financial institution. "Bringing in Trace gave us a sense of security, a sense of awareness, and it definitely brought in some...

Author: /time Magazine | Title: Small Business: Hackers For Hire | 12/10/2006 | See Source »

After calling for silence while he answered his cell phone, a still light-hearted Gillis reported his last-place finish to the crowd of around 40 people...

Author: By Crimson News Staff | Title: No Champagne for the Runners-Up | 12/8/2006 | See Source »

...security system. Rather than just checking a list of passenger names for those who might be suspected of terrorist activities, it applies a "risk assessment" to every airline passenger entering the U.S. by using more than two dozen criteria, including how the airline ticket was bought, contact phone numbers provided, and frequent flier information. ATS even wants to know your seat preference. The ATS data is fed to the National Targeting Center, a multi-agency center that crunches the data against criminal databases and watch lists. If your data raises too many concerns, or some questions can't be answered...

Author: /time Magazine | Title: Airline "Risk Assessment": Defending the Right to Snoop | 12/8/2006 | See Source »

Previous | 503 | 504 | 505 | 506 | 507 | 508 | 509 | 510 | 511 | 512 | 513 | 514 | 515 | 516 | 517 | 518 | 519 | 520 | 521 | 522 | 523 | Next