Operating systems outside of Windows hide huge security threats

  

At present, the vast majority of malware targets the attack on Windows systems. This makes us think that it is safe to use other operating systems. However, this is not the case. Since the 1970s, malicious programs for other operating systems have emerged. For example, Apple Systems became the target of the Elk Cloner virus for the first time in 1982, and until 1986, with MS-DOS. The emergence of compatible malware has made the Apple system free from Elk Cloner attacks.

Recently, Kaspersky Lab experts Magnus Kalkuhl and Marco Preuss wrote articles specifically highlighting some malware attacks on operating systems other than Windows, and detailed steps to protect the security of the operating system. .

According to the data, the rapid increase in the number of personal network users has caused the Windows system to occupy most of the market share, but this also creates conditions for the vigorous development of malware. While operating systems other than Windows seem to be safe, users of these systems are also likely to be targets for malware writers and cybercriminals. Even these users face far more threats than other Windows users because they stubbornly believe that the systems they use are very secure, so they are not aware of the need to adopt appropriate security measures.

For businesses, ensuring network security means protecting confidential data from manipulation or theft, while also protecting users under corporate networks from security threats. In the article, the author focuses on some of the tools currently available for Linux/Unix systems, including firewalls, intrusion detection and prevention systems, proxy servers, and more.

The author also highlights the fact that it may be difficult to find a suitable security solution for some non-Windows servers, because the operating system itself and the CPU it uses are different. If a suitable solution cannot be found, these systems should be kept away from the network to minimize the risk.

In addition, the network has now covered mobile devices, so network protection for mobile devices is also necessary. Increasing the diversity of protection means that the corresponding platform is constantly expanding, making it more difficult to find a suitable security solution to protect all network nodes.

Kaspersky Lab's experts also emphasize that although the use of non-traditional technology can provide some security, it is not absolutely guaranteed - for example, the Solaris desktop system may be considered unconventional, but Its server copy also supports standard systems, which makes the system more vulnerable. In general, any operating system, computer or network can be protected with complementary technologies that are combined with each other.

Copyright © Windows knowledge All Rights Reserved