The simplest example is that you can’t run Windows without antivirus and firewall, you can with Linux.
That’s literally only because there isn’t large enough marketshare of Linux to make it worth designing viruses and malware that targets Linux…
As Linux marketshare increases that will change but I guess that point went right over your head.
I really don’t think you understand what you’re leaving open when you expect a user to be a full-on administrator while connected to the internet and they know fuck-all about networking.
But Linux has a huge market share on servers. If it were possible for viruses and malware to affect it, they would have done so by now. Servers are a much more valuable target for malware anyway since they run on powerful hardware and have access to good connections and lots of interesting data.
Linux systems aren’t as prone to remote exploits, their software is more up to date, and it’s much harder to execute code on them.
Viruses and malware do effect linux servers. It’s not tough to do a search for CVEs on this stuff.
At my job we’ve got a red mark on an audit because of some dev’s pet Linux server was vulnerable to multiple critical CVEs. Thankfully it was isolated from the rest of our network due to being a dev’s pet project and not something we were officially supporting.
Linux may be more secure, but there’s no magic button for any OS to be perfectly protected against malware if you aren’t taking proper steps to protect it.
It’s literally marketshare. Linux isn’t by default more hardened. It can be more hardened by a professional who understands security, but it’s still at risk for all the same things Windows servers are, especially Social Engineering. Humans are almost always the weakest link in the security chain. Further, security researchers are literally seeing an increase in attacks on Linux-based servers.
But sure, I guess we couldn’t trust the research of VMware or anything. Please get out of here with this outright misinformation.
Drop in the bucket compared to Windows. Great, they found 3 pieces of malware that target Linux, 2 years ago. Lol.
Meanwhile there are dozens of Windows malware coming out every day, botnets are running hundreds of thousands to millions of compromised Windows systems, and ransomware is rampant on Windows.
Yeah, because botnets are made from consumer-level machines that are badly secured.
So some idiot who knows nothing about Linux sets it up the first time, never create an account other than the root account, never enabled UFW, and browses all day is literally the kind of people who make botnets are looking for to target. They don’t target Linux for these because it’s such a small market share in the consumer-desktop market.
Corporate servers tend to actually have competent security people running them, which is why you don’t see constant breaches of Linux servers, although it happens. Even then, corporate servers can be hacked if the services running on them aren’t appropriately patched. The Equifax hack is a great example of this, a series of cascading failures, and the CVE relating to it touched on that it was an Apache exploit that could work in either Windows or Linux.
The exploit should work on Windows and Linux. It tests which operating system it runs on via “@java.lang.System@getProperty(‘os.name’)”. It it runs on Windows, then it will execute cmd.exe /c followed by a command (highlighted in red in above’s sample). One Unix, it will execute /bin/bash -c followed by the same command.
Pro-tip: Cybersecurity is hard, and expecting random asshats who’ve never had any training figure out on the go is asking for a bad time.
That’s literally only because there isn’t large enough marketshare of Linux to make it worth designing viruses and malware that targets Linux…
As Linux marketshare increases that will change but I guess that point went right over your head.
I really don’t think you understand what you’re leaving open when you expect a user to be a full-on administrator while connected to the internet and they know fuck-all about networking.
But Linux has a huge market share on servers. If it were possible for viruses and malware to affect it, they would have done so by now. Servers are a much more valuable target for malware anyway since they run on powerful hardware and have access to good connections and lots of interesting data.
Linux systems aren’t as prone to remote exploits, their software is more up to date, and it’s much harder to execute code on them.
Viruses and malware do effect linux servers. It’s not tough to do a search for CVEs on this stuff.
At my job we’ve got a red mark on an audit because of some dev’s pet Linux server was vulnerable to multiple critical CVEs. Thankfully it was isolated from the rest of our network due to being a dev’s pet project and not something we were officially supporting.
Linux may be more secure, but there’s no magic button for any OS to be perfectly protected against malware if you aren’t taking proper steps to protect it.
https://www.zdnet.com/article/linux-malware-attacks-are-on-the-rise-and-businesses-arent-ready-for-it/
https://www.vmware.com/learn/security/exposing-malware-in-multi-cloud.html
It’s literally marketshare. Linux isn’t by default more hardened. It can be more hardened by a professional who understands security, but it’s still at risk for all the same things Windows servers are, especially Social Engineering. Humans are almost always the weakest link in the security chain. Further, security researchers are literally seeing an increase in attacks on Linux-based servers.
But sure, I guess we couldn’t trust the research of VMware or anything. Please get out of here with this outright misinformation.
Marketshare? For desktops sure, but servers? The internet is made of Linux servers.
Oh and lots routers, switches, hotspots, smart things, all kind of little things.
Drop in the bucket compared to Windows. Great, they found 3 pieces of malware that target Linux, 2 years ago. Lol.
Meanwhile there are dozens of Windows malware coming out every day, botnets are running hundreds of thousands to millions of compromised Windows systems, and ransomware is rampant on Windows.
Yeah, because botnets are made from consumer-level machines that are badly secured.
So some idiot who knows nothing about Linux sets it up the first time, never create an account other than the root account, never enabled UFW, and browses all day is literally the kind of people who make botnets are looking for to target. They don’t target Linux for these because it’s such a small market share in the consumer-desktop market.
Corporate servers tend to actually have competent security people running them, which is why you don’t see constant breaches of Linux servers, although it happens. Even then, corporate servers can be hacked if the services running on them aren’t appropriately patched. The Equifax hack is a great example of this, a series of cascading failures, and the CVE relating to it touched on that it was an Apache exploit that could work in either Windows or Linux.
https://isc.sans.edu/diary/22169
Pro-tip: Cybersecurity is hard, and expecting random asshats who’ve never had any training figure out on the go is asking for a bad time.