News

How to Protect Your ID Card Access Control System From Getting Hacked Hacking card readers and ID harvesting has quietly become one of the easiest ways to hack.
Vulnerabilities discovered in the PremiSys IDentity access system could render the building entrance security it provides useless. The vendor was warned about the flaws but still hasn't released ...
While 125 KHz cards are still commonly used, the widely publicized security issues must be given serious consideration when considering a card access control system.
During manufacturing, readers, cards and tags are programmed with the Valid ID algorithm, cryptographically ensuring the integrity of the sensitive access control data stored on the card or tag.
Access control systems are comprised of a number of critical components which are required for security safety control and convenient operation of the system. An increasing number of access ...
Having embraced the increasing trend towards a smart card system, LJMU has adopted a "one-card" identity solution for both access control and university management.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, ...
A retrofit project will bring the new AggieAccess system to more than 160 buildings and other locations on the Davis campus. All of the project locations already have electronic access controls — but ...
Typically access control systems provide security with ID cards, or more recently via mobile phone apps. However, to take security to an even higher level requires a biometric approach.
This is the second in a series of articles about access control and security on campuses. In the first article, I focused on the card itself – and primarily on the issues surrounding the issuance of a ...