Articles Search Results

209 Articles and 0 related Products found for hacking
  • Five fingerprint technology trends in 2015
    The integration of fingerprint sensors into smartphones and tablets is going from being a trend to becoming the norm. Together with Rutger P...
    Editor / Provider: Precise Biometrics | Updated: 2014 / 12 / 12
  • Identity management solutions keep intruders at Bay
    Identity management has become an increasingly important method of protecting assets, data, and premises by organizations, many of which hav...
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 11 / 4
  • Understanding “Real” PSIM
    PSIM (physical security information management) software is a rapidly growing segment in the security market. Its core strengths lie in the ...
    Editor / Provider: Israel Gogol, a&s International | Updated: 2014 / 10 / 15
  • Cracking down on camera hacks _ part 1
    Recent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more immin...
    Editor / Provider: Editorial Dept. | Updated: 2014 / 10 / 6
  • Cracking down on camera hacks
    Recent reports on baby cam hacks raised new concerns over malicious intrusion into networked security devices. The threat is even more immin...
    Editor / Provider: William Pao, a&s International | Updated: 2014 / 9 / 17
  • Controller options for access control
    Within a physical access control system, the decision to grant or deny access to a cardholder normally happens at the door controller locate...
    Editor / Provider: Tyco Security | Updated: 2013 / 11 / 26