Access "Linux malware: Challenges of the Linux worm"
This article is part of the June 2004 issue of Exposed: Why your AV software is failing to protect you
Worms and viruses are everywhere, but hardly a one for Linux. Only a handful of Linux malware has ever been released in the wild. While the Lion (2001), Ramen (2001) and Slapper (2002) worms and the Bliss virus (1997) presented problems for Linux users, they weren't nearly as crippling as the worst Windows malware. Don't be complacent. Malware writers will discover Linux as its popularity grows. , So, should Linux users brush off concerns about malware plagues? Short answer: No. Poor quality, high TCO and persistent security vulnerabilities are driving Windows shops to use Linux alternatives. Consequently, Linux implementations and GUIs are becoming easier to use, and it's probable that this wider adoption by novices will make Linux a greater malware target. But despite its advantages in averting infections, Linux isn't impervious. The new GUIs function much like Windows. The critical differences: No Linux mail client will automatically launch an executable when the user clicks on the attachment (although they'll let the user view the file in another program... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack.
-
NAC best practices and technologies to meet corporate security policy
by Curtis Dalton, CISSP
New solutions help you secure endpoints
-
Antivirus software comparison, 2004: Not all AV products are equal
-
-
Physical and IT Security: Overcoming Security Convergence Challenges
Physical and IT security convergence seems just one leap away...and may remain that way. Learn how to overcome security integration challenges.
-
Six Sigma and CMM models offer security best practices
Security can learn a lot from Six Sigma, CMM and other established business methodologies.
-
Physical and IT Security: Overcoming Security Convergence Challenges
-
Columns
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
Editor Lawrence M. Walsh says creative attackers are unintentionally aiding the search for better security defenses.
-
Firewall and system logs: Using log file analysis for defense
by Marcus Ranum
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
-
Prevent data loss, theft with secure data outputs
by Pete Lindstrom, Contributor
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
-
Linux malware: Challenges of the Linux worm
Should Linux users brush off concerns about malware plagues? Short answer: No. Learn more about Linux malware and the challenges posed by the Linux worm.
-
Internal security controls and business continuity go hand in hand
Learn the top four quality of security beliefs and see why better security means better quality.
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO