Mobile Security


Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

Top 5 Security Apps for iPhone 6

Top 5 Security Apps for iPhone 6

The 5 most common uses of the smartphone and a corresponding safety app or two to protect iPhone 6 users.

BadUSB is Haunting Cyber Space

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!

Honeywell Total Connect Remote Services Enhanced

Helps security dealers boost RMR and reach new markets while expanding connected home and business offerings with GPS vehicle and asset tracking.

HTC Announces $199 RE Camera

HTC Announces $199 RE Camera

The camera includes a 16MP sensor but lacks a viewfinder

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.



iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.

Are DIY Home Security Cameras the Wave of the Future?

Are DIY Home Security Cameras the Wave of the Future?

A group of cheap cameras turns your home into a do-it-yourself security system

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

Allows users to view and capture live video and still images as well as download existing files directly.

IC Realtime Launches Open Platform 720-degree Surveillance Camera Software

Presently available as a free App at iTunes.com, this special hardware-agnostic software enhances the user-experience of any 180- and 360-degree analog, IP or Megapixel surveillance camera by completely immersing the viewer into the center of the action.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

ADT to Offer New Remote and Mobile Products

ADT to Offer New Remote and Mobile Products

The home security company begins its movement into home-control products.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Unlock Your Smartphone with a Tattoo

Unlock Your Smartphone with a Tattoo

Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.