Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.
- By Ginger Hill
- Aug 04, 2014
Typewriter sales in German economy boom as tool to thwart cyber spying.
- By Ginger Hill
- Jul 25, 2014
Mobile provider will offer rewards, with a catch.
- By Matt Holden
- Jul 21, 2014
Apple customers warned to be aware of security risks on their iPhones.
- By Matt Holden
- Jul 14, 2014
Complete with an example of a strong, unique password with a surprise at the end, this is a must-read!
- By Ginger Hill
- Jul 10, 2014
Security software company found over 40,000 photos plus 750 emails and texts.
- By Matt Holden
- Jul 09, 2014
When most people think of school violence, they immediately think of school shootings. The media saturation that covers these shootings makes it unavoidable. however, school shootings are only the most extreme and rarest example of school violence.
- By Don Commare
- Jul 01, 2014
The ELERTS Campus app is designed for broader use among students, teachers and residents in keeping with the national “See Something, Say Something” campaign.
- By Jill Baker
- Jul 01, 2014
Integrated with the smartphone's firmware, it is impossible to remove or disable the malicious app.
- By Ginger Hill
- Jun 18, 2014
GSM radio sewn into sweatshirt allows different gestures to trigger different text messages to be sent to smartphone contact.
- By Ginger Hill
- Jun 09, 2014
Designed for company's DVRs and Hybrid DVR standalone recorders to allow more control of surveillance system in palm of users hand.
Just imagine unlocking your phone, buying apps and giving other apps permission to use your phone's fingerprint scanner for authentication.
- By Ginger Hill
- Jun 02, 2014
Tamoco utilized HID Trusted Tag Services to provide film lovers with the ability to use their Near Field Communications (NFC) enabled smartphone to receive Tribeca Film Festival tickets.
Engaging on Twitter leads to discover of app to help parents keep their children safe via open communication and allowing the child to be an advocate for their own safety.
- By Ginger Hill
- May 01, 2014
While most organizations have developed highly sophisticated, comprehensive emergency plans, they are often lacking the communication vehicle to meaningfully convey them and make them accessible to a wide audience before, during and after an event. Mobile devices provide a simple, efficient and secure channel to proactively get the most up-to-date plans and best practices into the right hands and mitigate overall risk.
- By Christopher Britton
- Apr 30, 2014
Heartbleed scanner identifies over 1,700 vulnerable mobile apps.
Collaboration aims to help more students connect with campus safety officials.
To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile.
- By Yishay Yovel
- Apr 18, 2014
Protect your digital life with this checklist of must-do security tasks.
- By Ginger Hill
- Apr 17, 2014
A short but close look at the murder of the password by biometrics, from the mainframe to the smartphone.
- By Ginger Hill
- Apr 16, 2014