No OS is safe, expert warns

No OS is safe from hackers, even though some believe certain systems are better equipped to fend off attacks than others, a security expert claims.

Cyber crime

Preconceptions that some operating systems are safer than others are misguided, a security expert has claimed.

In reality all systems have their flaws which hackers will attempt to exploit and, despite some people's belief Linux and Mac users are safer, all are vulnerable, said David Jacoby, a senior security researcher at Kaspersky.

"It doesn't really matter what you use," he told attendees at a Kaspersky press event in Munich.

"There is no such thing as a secure operating system."

In particular, Jacoby looked at the security problems with Linux. One notable issue is that Linux is often left out of the patch cycle, while many hackers have been seen using vulnerabilities in Linux to carry out "drive-by download" attacks.

These attacks are initiated when a hacker compromises a server running on Linux and adds malicious code to websites hosted on that server. When a user visits the site a malicious file is downloaded onto their systems.

Companies need to have the total package to protect their systems, from the right technology and anti-virus to local hardening and stronger resource segmentation to prevent spreading infections, Jacoby said.

Furthermore, businesses should look to protect both servers and clients, he added.

"It's about everything. Protection against malicious code, that is one thing, but that is not enough," Jacoby added.

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

Splunk debuts a new suite of cloud security solutions
Security

Splunk debuts a new suite of cloud security solutions

22 Jun 2021
Nvidia Jetson chips make IoT devices vulnerable to attack
vulnerability

Nvidia Jetson chips make IoT devices vulnerable to attack

22 Jun 2021
Cryptocurrency crimes have increased 12-fold since 2016
cryptocurrencies

Cryptocurrency crimes have increased 12-fold since 2016

22 Jun 2021
University Medical Center Mainz taps IBM to secure health care data
cloud security

University Medical Center Mainz taps IBM to secure health care data

21 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
Q&A: Enabling transformation
Sponsored

Q&A: Enabling transformation

10 Jun 2021
What is HTTP error 400 and how do you fix it?
Network & Internet

What is HTTP error 400 and how do you fix it?

16 Jun 2021