Looking for something else?
Alternative OS security: Mac, Linux, Unix, etc. News
June 03, 2016
Roundup: The new SandJacking attack technique allows attackers with physical access to iOS devices to install rogue apps. Plus, more on medical software security and Privacy Shield obstacles.
May 24, 2016
Google unveiled the next version of its mobile OS, and Android N security will be improved in a few ways, although Google still can't fix OS updates.
May 18, 2016
New research claims more than 95% of Android devices are vulnerable to clickjacking attacks, but the true danger may not be that severe.
April 14, 2016
The much-hyped Badlock bug is still important to patch, but raised issues with celebrity vulnerability promotion and responsible disclosure of security vulnerabilities.
Alternative OS security: Mac, Linux, Unix, etc. Get Started
Bring yourself up to speed with our introductory content
DOS (Disk Operating System) can refer to a computer operating system that is loaded from a disk drive or to an operating system based on Microsoft Disk Operating System (MS-DOS). Continue Reading
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and how to mitigate attacks. Continue Reading
Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used ... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Alternative OS security: Mac, Linux, Unix, etc. Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in their claims. Continue Reading
The latest version of Google's mobile operating system addresses some key enterprise security concerns. Expert Michael Cobb explains what's new in Android M. Continue Reading
In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen testers an OS that runs on ... Continue Reading
Manage Alternative OS security: Mac, Linux, Unix, etc.
Learn to apply best practices and optimize your operations.
In this excerpt of The Basics of Information Security, author Jason Andress outlines methods for improving operating systems security. Continue Reading
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat. Continue Reading
The Safari security update addresses a number of remotely exploitable vulnerabilities and includes a fix for a hack from the Pwn2Own competition. Continue Reading
Problem Solve Alternative OS security: Mac, Linux, Unix, etc. Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Masque attack is a malicious threat, yet Apple has downplayed the risk. Expert Nick Lewis explains how to keep employees from being tricked into installing malware. Continue Reading
PCI DSS audits are sure to include a look at Shellshock mitigation. Expert Mike Chapple discusses how organizations can prepare. Continue Reading
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading