Mobile Security


Apple Watch

The Security Features of the Apple Watch

We don’t know much yet, but Apple has shown a few features that will help keep your information safe.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights to App Trio

Agreement opens floodgates for international expansion.

Doyle Security Goes with SmartTek Systems Mobile Personal Security App

With nearly a century in business, now offering central station-based Smartphone app that provides anywhere, anytime life protection services and new revenue stream for its business.

HID Global to Deliver a Secure Mobile Access Solution via Samsung KNOX

Powered by Seos, HID Mobile Access operates on Samsung smartphones that support both Bluetooth Smart and NFC.

Scammers Taking Advantage of Apple Pay

Scammers Taking Advantage of Apple Pay

Criminals are using the platform to buy goods with stolen identities and credit cards

Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

By 2019, it is predicted that more than half a billion wearable devices will be in use each day.



Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights

Agreement opens floodgates for international expansion.

Planes Searched Amid Security Concerns

Planes Searched Amid Security Concerns

One commercial flight was diverted while two were also evacuated

Jimmy Kimmel Exposes Bad Password Security

Jimmy Kimmel Exposes Bad Password Security

The late night host was able to get passwords from strangers off the street in a skit on his show.

Mobile Apps have Exploded

Mobile Apps have Exploded

In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.

Searching the Horizon

Searching the Horizon

As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.

BlackBerry and Boeing Team up for Self-Destructing Phone

BlackBerry and Boeing Team up for Self Destructing Phone

The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.

Evidence Gathering and Management to Get Smarter in 2015

According to eMarketer, the United States will pass 50% Smartphone penetration among its population.

Tips to Improve Holiday Cyber Shopping Security

Tips to Improve Holiday Cyber Shopping Security

These tips will help secure pay data when shopping online

80 Percent of Patients Worry for Health Data Security

80 Percent of Patients Worry for Health Data Security

A new report indicates consumers remain concerned about medical technology and the security of their health information and data.

7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.

Apple Gets First Real Virus Scare

Apple Gets First Real Virus Scare

Wirelurker sneaks onto computers using unauthorized Chinese apps.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3