Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » smartphones

Articles Tagged with ''smartphones''

Smartphone App Helps to Identify Counterfeiting

April 14, 2014

MIT researchers have developed a new type of tiny, smartphone-readable particle that could tell if a food product is counterfeit.


Read More

State of Ohio Launches Safety Smart Phone App

April 14, 2014

Ohioans can now report suspicious activity to the state’s Homeland Security agency with a new app that can be downloaded on mobile devices.


Read More

Eye Reflections in Photos Could Help Solve Crimes

December 30, 2013

Researchers studying the level of detail in modern digital photographs were able to pick out the tiny reflections of faces hidden in the eyes of the subject and accurately identify them.


Read More

Bring-Your-Own-Device Policies Generate Security Trouble

October 1, 2012
The rapid proliferation of personal mobile devices is changing the IT environment in government enterprises.
Read More
Cyber Security -- Bring Your Own Device

Study: Cellphone Users Concerned about App Privacy

September 6, 2012

Nearly half of smartphone users refuse to download an app that requires too much personal information, especially location tracking. 


Read More

Smartphone Apps Streamline Mass Notification

September 4, 2012
On a subway train in the middle of July, two men walk onto a crowded train car in black trenchcoats buttoned up to their necks. Would a surveillance camera notice anything suspicious? Other passengers do.
Read More
Security News -- London Olympics

67,000 Phones Likely to Be Lost or Stolen During Olympics

July 23, 2012

The estimated loss of thousands of cell phones could result in the loss of 214.4 terabytes of data – the equivalent 214.4 million books. 


Read More

The Other Edge of Tracking People

zalud-2016-200px.jpg
Bill Zalud
May 1, 2012

For cell phone users, and that includes most everyone these days, there are myriad choices in plans beyond the hundreds of phones themselves. Anytime minutes. Off-peak minutes. Domestic roaming charges. International roaming charges. Minutes overage fees. Text messaging plans. Data plans. Limits and slowdowns on data plans.


Read More

Another Evolution?

Will Smart Card Trump Prox?
zalud-2016-200px.jpg
Bill Zalud
May 1, 2012
Smart cards, like other steps along technology’s ever-evolving pathway, biometrics and megapixel cameras to name two others, share ingrained challenges. New stuff is often more expensive than existing stuff. Bring something new in and, often, you have to upgrade other gear that is part of the total system to make it all work together. Then there are design, installation, maintenance and training costs as something new comes through the door.
Read More

Smartphones Can Open Doors, Dorm Doors That Is

March 16, 2012
Thanks, in part, to near field communication (NFC) chips embedded in smartphones, the door has opened for college students and staff to unlock and lock their campus doors using personal smartphones.
Read More
Previous 1 2 3 4 5 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing