Mobile Security


Intelligence on the Edge - Do you have an App for that?

Intelligence on the Edge

In video surveillance, the concept of centralized intelligent systems and intelligence on the edge is an on-going conversation, as both solutions have pros and cons depending on specific user needs and applications.

New Report Finds Security Gaps in Vehicle Technology

New Report Finds Security Gaps in Vehicle Technology

A report by U.S. Senator Edward Markey finds that most automakers don’t have the ability to find security breaches.

Security and Privacy for Wearables Not So Good

Security and Privacy for Wearables Not So Good

By 2019, it is predicted that more than half a billion wearable devices will be in use each day.

Two Big Problems with Fingerprint Security

Two Big Problems with Fingerprint Security

One tech expert says biometrics are good, but there are still problems to consider.

SmartTek Systems Grants OnWatch of Australia Exclusive Rights

Agreement opens floodgates for international expansion.

Planes Searched Amid Security Concerns

Planes Searched Amid Security Concerns

One commercial flight was diverted while two were also evacuated

Jimmy Kimmel Exposes Bad Password Security

Jimmy Kimmel Exposes Bad Password Security

The late night host was able to get passwords from strangers off the street in a skit on his show.

Mobile Apps have Exploded

Mobile Apps have Exploded

In 2014, the number of Internet users worldwide has reached nearly 30 billion. While the majority of these users connect via fixed-line to a PC, the growth of mobile- and cloud-based solutions has skyrocketed.



Searching the Horizon

Searching the Horizon

As the time nears on the shutdown of the second-generation, or 2G, wireless network, now is the time for security dealers and integrators to not only start planning for this massive migration but also begin searching for opportunities to make this change easier for themselves as well as their clients.

BlackBerry and Boeing Team up for Self-Destructing Phone

BlackBerry and Boeing Team up for Self Destructing Phone

The BlackBerry Enterprise Server (BES 12) will be integrated into the phone.

Evidence Gathering and Management to Get Smarter in 2015

According to eMarketer, the United States will pass 50% Smartphone penetration among its population.

Tips to Improve Holiday Cyber Shopping Security

Tips to Improve Holiday Cyber Shopping Security

These tips will help secure pay data when shopping online

80 Percent of Patients Worry for Health Data Security

80 Percent of Patients Worry for Health Data Security

A new report indicates consumers remain concerned about medical technology and the security of their health information and data.

7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

Stealthy youngster uses ninja-like skills to gain access to his father's iPhone6.

Apple Gets First Real Virus Scare

Apple Gets First Real Virus Scare

Wirelurker sneaks onto computers using unauthorized Chinese apps.

Guardly Enterprise E911 Solution Improves Active Shooter Response

New indoor positioning systems enhance ability for security teams to detect shooters earlier and locate people inside buildings.

mPERS Mobile App Trio Introduced by SmartTek Systems Provides Dealers with a Competitive Edge

Central station-based Smartphone apps that provide anywhere, anytime life protection services and new revenue stream for partners.

Do Not Post Pictures of Your Completed Ballot on Social Media

Do Not Post Pictures of Your Completed Ballot on Social Media

Steep fines are being issued and some are having their votes invalidated.

Using Bluetooth-enabled Devices as the Key to Remote Monitoring

As the desire to connect more real-world activities to the digital world increases, designers across industries are beginning to look at harnessing this technology as a way to enhance physical security.

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

Court Rules Police Can Force Users to Unlock iPhones with Fingerprints

The ruling doesn’t allow police to unlock phones using passcodes, however.

Featured

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.