MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
January 29, 2008
Greg Adler
Old BlackJack Whacks New BlackJack II Samsung's BlackJack II PDA phone offers only minor improvements over its cheaper predecessor. mark for My Articles similar articles
InternetNews
July 11, 2006
Andy Patrizio
Vishing Joins Phishing as Security Threat With users getting smart to phishing tricks, thieves find new ways to steal from you. mark for My Articles similar articles
PC World
April 29, 2008
Dan Tynan
Identity-Theft Protection: What Services Can You Trust? New online services offer to protect you from identity theft, and some claim to help you undo damage after it happens. But when we tested the services, we found that many fall short. mark for My Articles similar articles
PC Magazine
April 4, 2007
Four Ways to Surf Safely at Starbucks There's lots of buzz about wireless security these days, and dizzying lists of dos and don'ts for public wireless usage. mark for My Articles similar articles
Entrepreneur
October 2007
Jason Lee
Way to Pay New technologies make buying easier than ever. Cutting-edge advances in smart-card microchips and wireless solutions are giving consumers the option of leaving their cash and credit cards at home in favor of driver's licenses and cell phones. mark for My Articles similar articles
InternetNews
August 3, 2010
Health Care Orgs Endure Data Breach Epidemic Hospitals, medical centers and physicians' offices have been responsible for a disproportionately large number of data breaches so far this year, according to one security study. mark for My Articles similar articles
Information Today
September 16, 2010
Greg R. Notess
Google Instant: Interactive Searching One driving force behind Google's work on Instant is to help reduce the time it takes a user to enter a search. mark for My Articles similar articles
InternetNews
January 11, 2011
ID Theft Scam Targets Coke Fans Here's the latest in a long line of smash-and-grab phishing campaigns is using the soda giant as a lure to steal people's personal information. mark for My Articles similar articles
InternetNews
March 11, 2005
Jim Wagner
New Service to Put ID Protection in Your Hands Amid a flurry of data theft issues, Intersections readies an in-depth service to police who's trying to use all your data. This can help you spot identity theft. mark for My Articles similar articles
The Motley Fool
February 26, 2007
Mary Dalrymple
ID Theft of the Rich and Famous From Dumpsters to phishing, there are more than a few ways thieves might try to steal your identity. mark for My Articles similar articles
PC World
January 2, 2008
Carla Thornton
Fujitsu, Toshiba Laptops Offer Big Value Our list of desktop replacement laptops sees the debut of two relatively inexpensive newcomers. mark for My Articles similar articles
CIO
January 1, 2003
Alison Bass
Identity Crisis If identity theft isn't already on your radar screen, this headline will put it there: 13,000 Credit Reports Stolen by Hackers. To avoid a similar disaster on their turf, CIOs should insist their company's customer data be kept in separate databases protected by a number of different security measures. mark for My Articles similar articles
Financial Advisor
November 2005
Joel Bruckenstein
Securing Yourself And Clients Identity theft poses a serious threat for financial advisors and their clients. Here are steps to take to prevent identity theft and related security concerns. mark for My Articles similar articles
InternetNews
September 25, 2009
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. mark for My Articles similar articles
PC World
September 26, 2007
Melissa J. Perenson
A New Way to Print Any Document on the Road A free beta program from HP promises Internet-based printing. mark for My Articles similar articles
InternetNews
April 12, 2005
Clint Boulton
Web Services For Practical Users Liberty Alliance releases blueprints to help software developers write secure, personalized Web services applications using XML. mark for My Articles similar articles
CRM
April 1, 2005
The Pulse: Which Department Within Your Organization is in Charge of Owning the Customer Experience? Marketing: 20%... Customer Service: 46%... Sales: 20%... etc. mark for My Articles similar articles
T.H.E. Journal
February 2006
Don't Be Out'smart'ed The new breed of smart mobile phones will soon pose the biggest danger to your data security. Software companies are gearing up to nullify the threat. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
Financial Planning
December 1, 2006
Todd Davis
Practice Tips Here are some ways to avoid becoming another identity theft statistic. mark for My Articles similar articles
U.S. Banker
March 2003
Melissa Solomon
Is California Asking for Too Much Information? A new law is aimed at protecting customers from identity theft. The disclosures finance companies make could be embarrassing. Not telling could hurt even more. mark for My Articles similar articles
CRM
December 2013
Ray Wang
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. mark for My Articles similar articles
AskMen.com
March 12, 2003
Steve Richer
How To: Avoid Identity Theft Criminals steal identities to commit all kinds of fraud and hide the misdeeds they commit. In 2001, there were more than 86,000 victims of this crime in the United States; that figure almost doubled to 162,000 in 2002. Read on to learn how to avoid being the next victim. mark for My Articles similar articles
The Motley Fool
October 25, 2006
Rick Aristotle Munarriz
The Hacker Made Me Do It Investors: Psst! Your brokerage account is showing. Hackers are crafty. They'll always find a game to play. Just make sure to stay on your toes. Check your account often from a secure location -- or, better yet, have trade confirmations emailed to you. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
InternetNews
February 12, 2010
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. mark for My Articles similar articles
Inc.
May 2007
Daniel Akst
The Dangers of Identity Theft Entrepreneurs are especially vulnerable to identity fraud. mark for My Articles similar articles
The Motley Fool
December 30, 2004
Types of Identity Theft Learn what to look out for, and protect yourself! mark for My Articles similar articles
T.H.E. Journal
June 2006
Doug Gale
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. mark for My Articles similar articles
CRM
December 20, 2004
The Pulse: What is Your Customers' Primary Touch Point Within Your Ogranization? A chart depicting the enterprise segments customers reach first. mark for My Articles similar articles
AskMen.com
Michael Hirsch
How To: Deal With Identity Theft You probably don't think about it, but transactions you take for granted every day put you at risk for identity theft. mark for My Articles similar articles
InternetNews
November 4, 2008
David Needle
Here Comes a Mobile 'Universal Communicator' A free consumer service from VoxOx brings voice, video, IM, text, social media and other content into one interface. mark for My Articles similar articles
PC Magazine
April 18, 2007
Helen Bradley
Secrets of Readable Charts Measure for measure, a chart that can be easily read and understood will always win out over a chart that looks cool but says nothing or, worse, misleads. Here's are some tips to creating charts in Excel. mark for My Articles similar articles
PC Magazine
August 22, 2008
Matthew D. Sarrel
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Identity Crisis Identity management projects promise big returns, but be prepared for long, complex implementations. mark for My Articles similar articles
Bank Technology News
August 2010
Michael Sisk
Federated ID's Still in Search of an Identity In any federated system banks have some important decisions to make. mark for My Articles similar articles