Mobile Security


Twist Mobile Access Adoption Growing

Twist Mobile Access Adoption Growing

Smartphones expected to replace mechanical keys and physical access cards making user experience, value and new gestures a must.

BadUSB is Haunting Cyber Space

The ABC’s of Cyber Security

It’s time to stop lecturing about cyber security and transform it into a topic of conversation, a give-and-take discussion, so that an effective battle against cyber malice can wage, and hopefully, win out over cyber criminals. Our perceptions must change; we must take the time to make safety and security into habits when it comes to the cyber world.

Top 5 Security Apps for iPhone 6

Top 5 Security Apps for iPhone 6

The 5 most common uses of the smartphone and a corresponding safety app or two to protect iPhone 6 users.

BadUSB is Haunting Cyber Space

BadUSB is Haunting Cyber Space

Thumb drives could become the carriers for the next digital epidemic! There’s not only risk in the data that they store but also in the core of how USBs work. Security Today and Bob Ehlers from RGB Spectrum will be discussing the details about BadUSB. Dubbed by some media sources as “a critical security flaw that can turn USB drives into cyber threats,” BadUSB is giving hackers access to what they want most…our computers!

Honeywell Total Connect Remote Services Enhanced

Helps security dealers boost RMR and reach new markets while expanding connected home and business offerings with GPS vehicle and asset tracking.

HTC Announces $199 RE Camera

HTC Announces $199 RE Camera

The camera includes a 16MP sensor but lacks a viewfinder

HID Mobile Access Included as Enterprise Solution in the Samsung Enterprise Alliance Program

Powered by Seos and supporting Bluetooth Smart and NFC, HID Mobile Access functions exceedingly well on versatile Samsung smartphones that support both communication channels.

What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Documentation for iOS8 confirms no open access for developers to the NFC controller in the phone and no NFC APIs in the iOS8 SDK.



iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

iPhone 6 Touch ID Susceptible to Fake Fingerprint Hack

Sophisticated hackers able to lift fingerprints, replicate them and then use them to activate sensors on Apple smartphones.

Apple Can’t Unlock your iPhone for the Police, even with a Search Warrant

Apple Can’t Unlock Your iPhone for the Police, Even With a Search Warrant

The company says it has made it impossible in order to deflect allegations of collecting user information.

Apple Adds Additional Layer of Security to iCloud

Apple Adds Additional Layer of Security to iCloud

Three things you can do to better protect the data on your cloud.

Are DIY Home Security Cameras the Wave of the Future?

Are DIY Home Security Cameras the Wave of the Future?

A group of cheap cameras turns your home into a do-it-yourself security system

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

SecurityTronix Announces Free iPad App for Surveillance DVRs and HVRs

Allows users to view and capture live video and still images as well as download existing files directly.

IC Realtime Launches Open Platform 720-degree Surveillance Camera Software

Presently available as a free App at iTunes.com, this special hardware-agnostic software enhances the user-experience of any 180- and 360-degree analog, IP or Megapixel surveillance camera by completely immersing the viewer into the center of the action.

Symantec Combines Nine Norton Products to Create One Service

Symantec Combines Nine Norton Products to Create One Service

The product can be used on Windows, OS X, Android, and iOS

ADT to Offer New Remote and Mobile Products

ADT to Offer New Remote and Mobile Products

The home security company begins its movement into home-control products.

Facebook Follows its Users across Cyberspace

Facebook Follows its Users across Cyberspace

4 ways to battle this social media giant to beat them at their own game.

Google Turns in Man with Child Porn

Google Turns in Man with Child Porn

The internet company found illegal images in his Gmail account.

Unlock Your Smartphone with a Tattoo

Unlock Your Smartphone with a Tattoo

Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.

The Ultimate Cybersecurity Fix

The Ultimate Cybersecurity Fix

Typewriter sales in German economy boom as tool to thwart cyber spying.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.