Shopping? Check out our latest product comparisons

Security

The RadioVault opened with valuables inside

Cannon Security Products' has taken a stealthy new approach to securing valuables in the home with the RadioVault, a fingerprint activated safe that's hidden inside a fully functional iPod dock.  Read More

The August Smart Lock fits onto existing deadbolts

The August Smart Lock is a new product by designer Yves Béhar and technology entrepreneur Jason Johnson, which updates the humble door lock for the "Internet of Things" era. The device can be retrofitted to existing deadbolts and employs Bluetooth Low Energy technology in order to pair with an iPhone 4S or iPhone 5, and allow access for you and up to 10 of your iPhone-wielding friends.  Read More

Northrop Grumman's CUTLASS UGV is designed to provide remote handling and surveillance of ...

The arrest of one of the Boston Marathon bombing suspects was carried out, in part, with the help of a remote controlled robot. Such an operation highlights the growing uses of unmanned ground vehicles (UGV) in anti-terrorist and other operations. Northrop Grumman Corporation’s CUTLASS robot, developed by its division in Coventry, U.K. is designed to provide remote handling and surveillance of hazardous threats and is intended to replace British Army’s Wheelbarrow robot for bomb disposal.  Read More

The iPhone-based AOptix Stratus

When you think about portable biometric identification devices (you do think about them, right?), you likely picture relatively bulky contraptions. This week, however, California tech company AOptix announced its new Stratus biometrics system, that’s based around the user’s existing iPhone 4 or 4S.  Read More

The Natalia Project bracelets

Fighting for human rights is a noble undertaking, but it’s also extremely dangerous in places where that fight isn't about simply arguing over abstractions. Aware of the very real possibility of campaigners being beaten, kidnapped or murdered, Civil Rights Defenders in Stockholm has launched the Natalia Project. Named after Natalia Estemirova, a human rights activist who was abducted and murdered in Chechnya in 2009, it’s based on an electronic bracelet that sends a pre-programmed text alarm if activated or forcibly removed.  Read More

Vibromag Cables could find use in security fences such as this one

Things might be getting a little more difficult for the James Bonds and Jason Bournes of the world. A new system developed by Prof. Uwe Hartmann at Germany’s Saarland University utilizes the Earth’s magnetic fields to instantly determine when and where a security fence has been breached.  Read More

Professor Kamal Sarabandi's technique could be used to provide extra security in a range o...

An electrical engineering professor at the University of Michigan believes that a type of radar, part developed by the Department of Defense, has the potential to be used as a means of detecting concealed weapons. Originally intended for military use, it is possible that the millimeter-wave radar system could be used to detect weapons across distances as large as a football field.  Read More

The LEGO bookend safe

Every year a contest called the MocAthalon takes place, in which contestants must come up with the most creative things to build from LEGOs ... and some of them are truly mind-blowing. This year, creator Blake Baer and the Clutch Builders team crafted some sneaky bookends and LEGO books that actually hide a secret compartment.  Read More

BikeSpike is a device that adds an extra layer of security to bicycles by enabling cyclist...

Bicycles are a notoriously easy target for thieves, but technology is here to help in the form of a new device that promises to help cyclists safeguard their property and recover it if stolen. Currently seeking funds on KickStarter, the Chicago-based BikeSpike team has designed a GPS tracker that features a built-in antenna, an on-board accelerometer and a connection to a GSM mobile phone network that allows users to keep tabs on their bike via a smartphone or computer.  Read More

The biometric “on-card comparison” system compares a signature against one stored on the c...

If you watch a handwriting expert authenticate a signature, they will talk about echoes of the process of signing one's name – darker or lighter lines reveal pressure variations, the shape of the loops reveals the shaking of the hand, and the flow of the ink shows if the signature was laid down without hesitation. These echoes of the act of writing make a signature far more revealing than a simple squiggle on paper. Now researchers from the Fraunhofer Institute for Computer Graphics Research (IGD) have created a credit card that contains a thorough description of these signature traits, which can be used for instant authentication.  Read More

Looking for something? Search our 27,844 articles