New & Notable
Alternative OS security: Mac, Linux, Unix, etc. News
April 02, 2014
The Safari security update addresses a number of remotely exploitable vulnerabilities and includes a fix for a hack from the Pwn2Own competition.
February 25, 2014
Apple has followed up a recent set of iOS fixes with an urgent patch for OS X, correcting a flaw that enabled man-in-the-middle attacks.
February 23, 2014
Apple patched a critical iOS SSL flaw Friday that allows attackers to manipulate SSL/TLS data. The flaw exists in OS X too and has yet to be fixed.
October 07, 2013
Application security expert Michael Cobb discusses the new Samsung KNOX platform and its ability to improve Android security in the enterprise.
Alternative OS security: Mac, Linux, Unix, etc. Get Started
Bring yourself up to speed with our introductory content
IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). The main problem is that because the idea of networking appliances and other objects is relatively new, security has not... Continue Reading
An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes. Continue Reading
A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network. Given the prevalence of wireless technology, the increasing ... Continue Reading
Evaluate Alternative OS security: Mac, Linux, Unix, etc. Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Apple has provided little transparency of its iOS -- until now. Are Apple devices truly secure enough for enterprise use? Michael Cobb explains. Continue Reading
In this video, Cryptography Research president and SSL 3.0 co-creator Paul Kocher reflects on SSL's history and Apple's recent SSL security snafu. Continue Reading
Opinion: Apple security is perceived to be very good, but as the popularity of Apple technologies increases, so too are the dangers for Apple users and the companies charged with securing Apple products. Continue Reading
Manage Alternative OS security: Mac, Linux, Unix, etc.
Learn to apply best practices and optimize your operations.
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation. Continue Reading
Mac malware is starting to use the evasion techniques of Windows malware. Enterprise threats expert Nick Lewis discusses the risks. Continue Reading
Linux servers are used throughout many enterprises, and their security posture shouldn't be overlooked. In this tip, King Ables discusses risk assessment pointers for Linux server systems. Continue Reading
Problem Solve Alternative OS security: Mac, Linux, Unix, etc. Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Fokirtor Trojan creates a dangerous backdoor in Linux systems. Learn how to keep enterprise Linux systems from being infiltrated and compromised. Continue Reading
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed. Continue Reading
The recent Flashback malware proved attackers are targeting Macs, too. Learn how to improve Mac hardening against future Mac malware. Continue Reading