Email Alerts
-
How to break into a computer that is right at your fingertips
Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer. Book Chapter
-
SAP Security Learning Guide
This guide pulls SAP security information from both SearchSecurity.com and its sister site, SearchSAP.com, to provide the most comprehensive resource around for all aspects of making your SAP system bulletproof. Learning Guide
-
A little betrayal: Windows purists using Linux security features
Jay Beale explains how Windows purists can leverage Linux security features without compromising their allegiance to Redmond. Feature
-
Linux clears scalability, security hurdles
Does Linux have what is takes in terms of scalability, applications and security? Companies like Weather.com are saying yes. Feature
-
Malware identified as latest Mac Trojan targeting activists
Apple platform security firm Intego has discovered OSX/Imuler.E, a new variant of the Imuler Trojan. News | 14 Nov 2012
-
ESET calls Flashback Trojan threat now 'extinct'
ESET reports on how the Flashback Trojan changed the relationship between Apple and Java. News | 21 Sep 2012
-
Crisis Trojan, new Mac OSX Trojan, considered a low risk for now
Mac security vendor Intego identified the Crisis Trojan, a new Mac OSX Trojan, as a likely future weapon for targeted attacks against Apple endpoints. News | 25 Jul 2012
-
Intel CPU hardware vulnerable to a privilege escalation attack
A software implementation issue enables an attacker to escalate privileges or break out of a virtual machine environment. News | 19 Jun 2012
-
Nothing funny about SCADA and ICS security
A researcher calls the state of industrial control system security “laughable” and warns of the consequences of unpatched critical infrastructure that is reachable over the Internet. News | 06 Feb 2012
-
Attackers set sights on Mac OS X with Apple malware toolkit
A security team at CSIS Security Group discovered a crimeware toolkit targeting Mac OS X being sold on the black market. Researchers are also noting an increase in fake antivirus. News | 02 May 2011
-
Google acknowledges Android Trojan, takes security steps
The search engine giant said it would take steps to prevent additional malicious applications from using similar exploits from being distrusted via its Android Market. Article | 08 Mar 2011
-
Opinion: Welcome, Apple users, to your new miserable experience
Opinion: Apple security is perceived to be very good, but as the popularity of Apple technologies increases, so too are the dangers for Apple users and the companies charged with securing Apple products. Column | 26 Jul 2010
-
Malware discovered in freely distributed Mac applications
Security researchers at antivirus vendor Intego have discovered spyware attached to freely downloadable Mac applications. The malware is difficult to detect. Article | 03 Jun 2010
-
Report: Google to phase out Windows, cites security issues
Google is phasing out Microsoft Windows, citing the Aurora attacks, which targeted a flawed version of Microsoft Internet Explorer, according to a report in The Financial Times. Article | 01 Jun 2010
- See more News on Alternative OS security: Mac, Linux, Unix, etc.
-
Reassessing Mac enterprise security in face of Flashback malware
Expert Nick Lewis discusses how Mac enterprise security must evolve to combat the rising Mac malware tide, spearheaded by the Flashback malware. Tip
-
Examining Kindle Fire security, Silk browser security in the enterprise
Do Kindle Fire security issues, combined with weak Silk browser security, make the red-hot consumer device too risky for enterprises? Michael Cobb explains. Tip
-
Mac enterprise security: Going beyond Mac malware scans
More attackers see an opportunity in Mac enterprise environments. Mike Cobb explains how to ensure a Mac enterprise security plan goes beyond Mac malware scans. Tip
-
Android security settings and controls for Android enterprise security
Can Androids ever be secure enough for corporate use? Learn about Android security controls to enable effective Android enterprise security. Tip
-
Windows vs. Mac security: An enterprise endpoint security comparison
Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security. Tip
-
Malware on a Mac: How to implement a Mac antimalware program
Learn how to create a Mac security program at your enterprise, before the amount of Apple platform malware reaches critical mass. Tip
-
Linux security best practices for Linux server systems
Linux servers are used throughout many enterprises, and their security posture shouldn't be overlooked. In this tip, King Ables discusses risk assessment pointers for Linux server systems. Tip
-
Take four steps toward Macbook security
Your organization may primarily be a Windows shop, but Macbooks are becoming popular among executives and Macintosh computer security must be understood. Tip
-
Mac OS memory flaws pose challenges for enterprise endpoint protection
Recent research suggests that poor memory protections in the Mac OS make it much less secure than previously believed. Dee-Ann LeBlanc details how the Mac OS can be exploited and whether new defenses are needed to protect Mac endpoints on enterprise ... Tip
-
Rootkit Hunter demo: Detect and remove Linux rootkits
Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions. Tip
- See more Tips on Alternative OS security: Mac, Linux, Unix, etc.
-
Does the iOS Security Guide reveal any Apple iOS security issues?
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed. Answer
-
Does Flashback malware show need for more Mac hardening?
The recent Flashback malware proved attackers are targeting Macs, too. Learn how to improve Mac hardening against future Mac malware. Answer
-
OS X antivirus software: Enterprise virus protection for the Mac
Macs should be protected against malware and unauthorized access just like their Windows counterparts. Learn how in this expert response. Answer
-
How to mitigate the risk of a TOCTTOU attack
Are TOCTTOU attacks, exploiting time-of-check-to-time-of-use race conditions, a threat to your enterprise file systems? Expert Michael Cobb discusses the dangers and how to mitigate them. Answer
-
Is full-disk server encryption software worth the resource overhead?
While encrypting production servers may seem like a good security move, according to Anand Sastry, doing so may not be worth the resources it uses. Answer
-
Best practices: Separation of duties for security administrators
In this Q&A, expert Michael Cobb explores separation of duties for security administrators with access to domain controllers and servers running Windows, UNIX and Linux. Ask the Expert
-
What are the Mac OS X Snow Leopard antivirus features?
The latest Mac OS X, Snow Leopard, includes new antimalware protection. Don't get too excited, though, says application security expert Michael Cobb. Ask the Expert
-
Security comparison: Mac OS X vs. Windows
The Mac OS X vs. Windows debate will likely never be resolved, but that won't stop expert Michael Cobb from giving it his best shot. Our platform security expert explains how each operating system combats malware. Ask the Expert
-
How secure is 'Platform as a Service (PaaS)?'
There's no doubt that companies will want to leverage cloud computing and platform as a service, but expert Michael Cobb explains why enterprises should proceed with caution. Ask the Expert
-
How to harden Linux operating systems
Specific advice on hardening a server depends to some extent on its intended role, says expert Michael Cobb in this SearchSecurity.com Q&A. Ask the Expert
- See more Expert Advice on Alternative OS security: Mac, Linux, Unix, etc.
-
trusted computing
Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications... (Continued) Definition
-
IE9 security, Apple security issues: Video with Gartner’s Neil MacDonald
In this video, Gartner’s Neil MacDonald discusses patch management, IE9 security, his Windows 8 security wish list and protecting Apple computers. Video
-
Mac OS X security threats and Mac attacks
Security researcher Vincenzo Iozzo explains how he found a way to inject malicious code directly into Mac OS X memory, leaving no trace for forensics investigation. Video
-
Does the iOS Security Guide reveal any Apple iOS security issues?
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed. Answer
-
Malware identified as latest Mac Trojan targeting activists
Apple platform security firm Intego has discovered OSX/Imuler.E, a new variant of the Imuler Trojan. News
-
ESET calls Flashback Trojan threat now 'extinct'
ESET reports on how the Flashback Trojan changed the relationship between Apple and Java. News
-
Does Flashback malware show need for more Mac hardening?
The recent Flashback malware proved attackers are targeting Macs, too. Learn how to improve Mac hardening against future Mac malware. Answer
-
Crisis Trojan, new Mac OSX Trojan, considered a low risk for now
Mac security vendor Intego identified the Crisis Trojan, a new Mac OSX Trojan, as a likely future weapon for targeted attacks against Apple endpoints. News
-
Reassessing Mac enterprise security in face of Flashback malware
Expert Nick Lewis discusses how Mac enterprise security must evolve to combat the rising Mac malware tide, spearheaded by the Flashback malware. Tip
-
Intel CPU hardware vulnerable to a privilege escalation attack
A software implementation issue enables an attacker to escalate privileges or break out of a virtual machine environment. News
-
Examining Kindle Fire security, Silk browser security in the enterprise
Do Kindle Fire security issues, combined with weak Silk browser security, make the red-hot consumer device too risky for enterprises? Michael Cobb explains. Tip
-
Nothing funny about SCADA and ICS security
A researcher calls the state of industrial control system security “laughable” and warns of the consequences of unpatched critical infrastructure that is reachable over the Internet. News
-
Mac enterprise security: Going beyond Mac malware scans
More attackers see an opportunity in Mac enterprise environments. Mike Cobb explains how to ensure a Mac enterprise security plan goes beyond Mac malware scans. Tip
- See more All on Alternative OS security: Mac, Linux, Unix, etc.
About Alternative OS security: Mac, Linux, Unix, etc.
Get tips on how to improve operating system (OS) security for MAC, Linux, Unix and others. Learn how to repair flaws and avoid problems, threats and vulnerabilities by installing updates and patches. Also get advice on tools, software and secure deployment.
Security Management Strategies for the CIO