11/6/2022 0 Comments Security through obscurity![]() Program and dumb enough to actually do it are unlikely to go far. SECURITY THROUGH OBSCURITY UPDATELast week's Red Hat security update phishingĪttempt was clumsy in the extreme - social engineering attacks thatĪssume a victim simultaneously smart enough to untar and build an attack Somebody will certainly find a way to compromise them. As the free mail clients become increasingly complex and powerful, Have made it clear that Linux-based browsers are not free of exploitableīugs. There willĪlmost certainly be some unpleasant episodes in the future. Linux systems are not immune from the ills of modern computing. One can only assume that such attempts haveīeen made, but that they have not succeeded. Idea that nobody with the requisite skills has even tried to create such an ![]() ![]() Compromises do happen, but the sort of widespread troubleĮxperienced by others has, so far, been absent from the Linux world. There are, in other words, incentives to compromise Linux systems on a wide The ultimate payoff might be smaller, but anĪttacker could have the entire field to himself. Linux browsers, or direct them to unwanted pages, would merit a few minutes Certainly, one might think, being able to dump ads into Spammers seem to think that getting around SpamAssassin's tests is worth Of zombies which, one thinks, would be worth the trouble. SECURITY THROUGH OBSCURITY FULLThose millions of systems, he or she would have a nice little corral full There are millions of Linux systemsĪttached to the net many of them are in prominent locations with access to Networks can now be bought and sold, as can information stolen by spyware Steady stream of issues with free software being reported there.Īnother reason to attack systems is monetary gain. One need not read Bugtraq for long to see that there is a Researchers certainly do not find free software to be too obscure to merit Nice break while somebody else's worm is ravishing corporate networksĪlong these lines, it's worth noting that the white-hat security Uncrowded pastures of the Linux world? If nothing else, it would make a Least one malware author would be attracted by the relatively green, Say, a lot of people playing in that space. You'll find that the barriers to entry are fairly high: there are, shall we If youĪre trying to show your 31337 credentials by compromising Windows systems, That fame, such as it is, only attaches to a pseudonym somewhere. Is simply attracting attention and becoming in some way famous, even if The "not popular enough" argument may help make victimsįeel better and make them feel that they need not worry about perhapsĬhanging operating systems, but it does not stand up to scrutiny.Īttackers have numerous reasons for doing the things they do. ![]() We're not actually more secure we're just Spyware and related nastiness, is that we are such a backwater that nobodyĮven feels a wish to attack us. Of worms, and that Linux users are not continually trying to fight off So, it seems, the only reason that Linux does not suffer a constant series Of course you could write such things for the SECURITY THROUGH OBSCURITY MAC OSThese scourges off of Linux and the Mac OS is that it's not worth Talk about "security through obscurity"! The only thing keeping Likely that a recipient will be able to become infected. Popular platforms because their comparative rarity makes it less Platform-specific and their authors don't write them for less Windows, but why couldn't they? The executable attachments are Of course, worms such as these don't exist for platforms other than ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |