Entries by Evan Youngman

Emotet Computer Worm

    Security researchers have detected a new form of the famous malware loading program Emotet. This modified version of the worm spreads through Wi-Fi networks that are protected only by weak passwords. What makes this malware a worm as apposed to a virus is that while viruses must be triggered into activation by their […]

Automatic Systems Turnstiles

  The events of the last year have created a demand for products that function not only as physical security measures, but also create an environment that is conducive to COVID rule adherence. While mask detection and temperature readings are being done in the video surveillance market, the access control industry has moved to “contactless” […]

Access Control Systems Based on Physical Attributes

The ultimate access control system would uniquely identify a person and admit that person and only that person independent of whether the person possessed a particular coded card or token and/or knew a particular code. This ultimate identification system would be based on one or more physical characteristics. Nonautomated physical attribute identification systems have long […]

The Five Phases of Access Control

The purpose of access control is to grant entrance to a building or office only to those who are authorized to be there. The deadbolt lock, along with its matching brass key, was the gold standard of access control for many years; however, modern businesses want more. Yes, they want to control who passes through […]