Looking for something else?
Alternative OS security: Mac, Linux, Unix, etc. News
July 07, 2016
Vulnerabilities on devices with Qualcomm chipsets can allow Android full-disk encryption to be bypassed by malicious actors or law enforcement.
June 03, 2016
Roundup: The new SandJacking attack technique allows attackers with physical access to iOS devices to install rogue apps. Plus, more on medical software security and Privacy Shield obstacles.
May 24, 2016
Google unveiled the next version of its mobile OS, and Android N security will be improved in a few ways, although Google still can't fix OS updates.
May 18, 2016
New research claims more than 95% of Android devices are vulnerable to clickjacking attacks, but the true danger may not be that severe.
Alternative OS security: Mac, Linux, Unix, etc. Get Started
Bring yourself up to speed with our introductory content
DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS). Continue Reading
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and how to mitigate attacks. Continue Reading
Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used ... Continue Reading
Evaluate Alternative OS security: Mac, Linux, Unix, etc. Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in their claims. Continue Reading
The latest version of Google's mobile operating system addresses some key enterprise security concerns. Expert Michael Cobb explains what's new in Android M. Continue Reading
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on ... Continue Reading
Manage Alternative OS security: Mac, Linux, Unix, etc.
Learn to apply best practices and optimize your operations.
Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if encryption can be reinstated. Continue Reading
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat. Continue Reading
Problem Solve Alternative OS security: Mac, Linux, Unix, etc. Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Masque attack is a malicious threat, yet Apple has downplayed the risk. Expert Nick Lewis explains how to keep employees from being tricked into installing malware. Continue Reading
PCI DSS audits are sure to include a look at Shellshock mitigation. Expert Mike Chapple discusses how organizations can prepare. Continue Reading
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading