Mobile Security


Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

Top 5 Security Apps for iPhone 6

Top 5 Security Apps for iPhone 6

The 5 most common uses of the smartphone and a corresponding safety app or two to protect iPhone 6 users.

BadUSB is Haunting Cyber Space

Twitter Chat

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!

Honeywell Total Connect Remote Services Enhanced

Helps security dealers boost RMR and reach new markets while expanding connected home and business offerings with GPS vehicle and asset tracking.

HTC Announces $199 RE Camera

HTC Announces $199 RE Camera

The camera includes a 16MP sensor but lacks a viewfinder

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.



iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.

Are DIY Home Security Cameras the Wave of the Future?

Are DIY Home Security Cameras the Wave of the Future?

A group of cheap cameras turns your home into a do-it-yourself security system

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

Allows users to view and capture live video and still images as well as download existing files directly.

IC Realtime Launches Open Platform 720-degree Surveillance Camera Software

Presently available as a free App at iTunes.com, this special hardware-agnostic software enhances the user-experience of any 180- and 360-degree analog, IP or Megapixel surveillance camera by completely immersing the viewer into the center of the action.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

ADT to Offer New Remote and Mobile Products

ADT to Offer New Remote and Mobile Products

The home security company begins its movement into home-control products.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Unlock Your Smartphone with a Tattoo

Unlock Your Smartphone with a Tattoo

Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

Digital Edition

  • Security Today Magazine - April 2019

    April 2019

    Featuring:

    • An Iron Solution
    • Simplify, Automate and Modernize
    • Paving Safer Roads
    • Crime-busting Technology
    • Helping Those in Need

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety