Security Today and Protect America have partnered to bring you a fun and festive Halloween Twitter chat about keeping parents, kids and pets safe during this time of witches flying on broomsticks, the pitter-pat of little ghost and ghoul feet and candy, candy, candy! Join us to learn some awesome safety tips as well as the chance to win treats by answering trivia questions throughout the chat! No tricks here, just treats!
- By Ginger Hill
- Oct 31, 2014
Customers are worried about the safety of their banking information.
- By Matt Holden
- Oct 30, 2014
Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.
- By John Fenske
- Oct 24, 2014
It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.
- By Ginger Hill
- Oct 23, 2014
The 5 most common uses of the smartphone and a corresponding safety app or two to protect iPhone 6 users.
- By Ginger Hill
- Oct 22, 2014
Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!
- By Ginger Hill
- Oct 16, 2014
Helps security dealers boost RMR and reach new markets
while expanding connected home and business offerings with GPS vehicle and asset tracking.
The camera includes a 16MP sensor but lacks a viewfinder
- By Matt Holden
- Oct 09, 2014
Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.
Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.
- By Jim McHale
- Sep 29, 2014
Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.
- By Ginger Hill
- Sep 24, 2014
The company says it has made it impossible in order to deflect allegations of collecting user information.
- By Matt Holden
- Sep 18, 2014
Three things you can do to better protect the data on your cloud.
- By Ginger Hill
- Sep 08, 2014
A group of cheap cameras turns your home into a do-it-yourself security system
- By Matt Holden
- Sep 02, 2014
Allows users to view and capture live video and still images as well as download existing files directly.
Presently available as a free App at iTunes.com, this special hardware-agnostic software enhances the user-experience of any 180- and 360-degree analog, IP or Megapixel surveillance camera by completely immersing the viewer into the center of the action.
The product can be used on Windows, OS X, Android, and iOS
The home security company begins its movement into home-control products.
- By Matt Holden
- Aug 14, 2014
4 ways to battle this social media giant to beat them at their own game.
- By Ginger Hill
- Aug 06, 2014
The internet company found illegal images in his Gmail account.
- By Matt Holden
- Aug 05, 2014