Mobile Security


Tri-Ed and ECKey Helps Transform Smartphones into Access Control Credentials

The administrative burden of cards is eliminated while security compliance is improved.

Stopping Theft in Its Tracks

Stopping Theft in Its Tracks

The evolution of line security for handheld electronics in retail stores has been nothing short of amazing. When Scorpion Security Products launched its Scorpion security device, telecommunication and consumer electronics companies around the globe wanted the most unobtrusive, minimal security possible.

aptiQmobile Now Included in the Samsung Solutions Exchange

NFC-enabled Samsung smartphones can now be easily used as ID badges for access control and other applications.

Reimagining Strategies

Reimagining Strategies

Security is no longer chained to a desktop, and breaking these chains has changed the face of remote monitoring. It used to be that remote monitoring meant keeping an eye on things from a central station, like a corporate security command center or even a thirdparty monitoring service.

Galaxy S5 Adds Biometrics to Increase Security

Galaxy S5 Adds Biometrics to Increase Security

Adding to their repertoire of products, the S5 boasts a fingerprint scanner, water and dust resistance and heart rate monitor.

Cell Phone Hacking – Android Platform

Cell Phone Hacking – Android Platform

Never underestimate the appeal of smartphones for hackers with 1.4 billion of them traveling around in society. Tips to protect yourself and your Android included.

Starbucks Mobile Payment App Stores Unencrypted Passwords

Starbucks Mobile Payment App Stores Unencrypted Passwords

This might make you think twice about using your smartphone to pay for your Starbucks coffee drinks.



Top 10 Articles of 2013 on Security Today

Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.

An Essential Tool - Customer-centric security operations now require mobility

An Essential Tool

Mobile devices and mobile apps have become a fixture in the lives of people around the globe.

Top 8 Android Security Apps, Android Security Apps, Android Security, ESET Mobile Security, CoverMe Secure Messenger and Vault, Where’s My Droid, G Cloud Backup, SurfEasy VPN for Android, App Lock (HI AppLock), Keeper Password and Data Vault, App Cache Cleaner

Top 8 Android Security Apps

Awhile back, I explored the Top Security Apps for iPhone, so I felt that it was time to do the same for Android smartphones. For the Android security apps, I focused not only on ratings and recommendations, but also on finding cost-effective, easy-to-use security apps that won’t kill your budget!

Public Charging Stations: Bad for Our Device

Public Charging Stations: Bad for Our Device's Health?

To plug in or not to plug in? This is the question. Innovative Technology’s CEO, Corey Lieblein examines portable power solutions vs. the public charging kiosk.

Apple Releases Software Update to Support iCloud Keychain

Apple Releases Software Update to Support iCloud Keychain

After unveiling iPad Air, Apple releases update for all things "i".

Bosch Releases Remote Security Control App for Android Devices

Bosch Releases Remote Security Control App for Android Devices

Delivers flexibility and convenience to customers.

aptiQmobile Turns Smartphones into Credentials

aptiQmobile Turns Smartphones into Credentials

aptiQmobile is now commercially available to all.

Changing Business

Five or six years ago, when PDAs began taking on the characteristics of today’s Blackberries, iPhones and Androids, video surveillance manufacturers rushed to develop mobile capabilities.

Quantum Secure Mobile Apps Deliver Convenience and Functionality for Security Operations

Customer-centric approach helps security departments connect with users.

iPhone and Dog Team Up to Protect Child from Abuse

iPhone and Dog Team Up to Protect Child from Abuse

A Charleston, SC family is forever thankful to their dog, Killian, as well as their iPhone.

iPhone 5s Unveiled with Security Built into the Users Fingertips

iPhone 5s Unveiled with Security Built into the Users Fingertips

Drum roll please...iPhone 5s has modern, sleek design with a high level of security.

New Eiris Go mobile App Extends Real Time Location Alerts to Emergency Field Operations

New Eiris Go Mobile App Extends Real Time Location Alerts to Emergency Field Operations

Personnel can receive immediate, indoor, location position data regarding a security situation as it unfolds.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.