Operating Systems
Operating Systems | News, how-tos, features, reviews, and videos
Securing Windows and Office in a time of COVID-19: update policies, remote options
Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.
Best Android antivirus? The top 8 tools
There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.
8 steps to being (almost) completely anonymous online
The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it.
The 9 Windows Server security settings you need to get right
With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be.
How to implement Windows 7, Server 2008 security updates after end-of-life
Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them.
How to manage Windows 10 1903 and 1909 security updates
Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know.
Emergent Android banking Trojan shows app overlay attacks are still effective
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.
How to lock down enterprise web browsers
Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.
How to audit permissions after a Windows migration
As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.
How to secure Microsoft-based election, campaign systems
Microsoft has issued guidance and provided resources for local election bodies and candidate campaigns to help protect systems and communications.
Critical remote code execution flaw fixed in popular terminal app for macOS
Users of the iTerm2 terminal app are encouraged to update as soon as possible.
Zero-day vulnerability gives attackers full control of Android phones
Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and...
How to protect and safely erase data on Windows devices
Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.
How to migrate smartphone users to the Outlook app with Intune
With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.
How to detect and halt credential theft via Windows WDigest
Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them.
SMS-based provisioning messages enable advanced phishing on Android phones
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.
How to check Privileged Identity management settings for Office 365
Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.
Know your Edge Chromium security options
Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.
Critical VxWorks flaws expose millions of devices to hacking
Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and...
How to set up Microsoft Azure AD Identity Protection to spot risky users
Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.