If you really want the latest version you can clone the project from GitHub and keep it synchronized. Updates in package managers are always likely to be slightly behind. The versions in the Manjaro and Fedora packages were newer. Although it's only 4 months old, Lynis considers this very old. "Version of Lynis is very old and should be updated": This is actually the newest version of Lynis in the Ubuntu repositories.You nominate yourself as a victim by being vulnerable. Automated port-scanning and other techniques just seek out vulnerable systems and attack them. Most threats are indiscriminate because malware doesn't care who you are. Of the total number of cyberattacks, only a small percentage are consciously targeted at specific organizations or individuals. Regardless of the nature of present or future attacks, it only makes sense to plug those gaps in advance. However, we do understand which points in a computer's defenses are vulnerable. It's impossible to predict what cyberthreats will be capable of in the future. A successful "attack" was demonstrated by researchers at Ben-Gurion University of the Negev that would allow threat actors to exfiltrate data from an air-gapped computer. Proof-of-concept code has also been developed. Rootkits, like Ryuk, can infect computers when they're turned off by compromising the wake-on-LAN monitoring functions. They're capable of doing things that, just a short while ago, were considered impossible. To condense it somewhat, cyberattacks are many and varied. What danger remains if you're careful, sensible, and mindful when you use your computer? The answer is long and detailed. Linux and Unix-like operating systems, like macOS, are getting the full attention of threat actors. But now that Linux runs the world, it's back. It jumped the fence when Windows took off and hogged the limelight. Why are they named after root? Because the first rootkit was released in 1990 and targeted at Sun Microsystems running the SunOS Unix. This gives the superuser access to the threat actor (i.e., the bad guy). Rootkits were named after the Unix superuser (root) and the collection of software (kits) with which they install themselves to evade detection. In fact, the very first computer worm was designed to target Unix computers in 1988. Outright paranoia isn't useful to anyone, so how concerned should you be? If you only visit reputable web sites, don't open attachments or follow links in unsolicited emails, and use different, robust, passwords for all the systems you log in to, what danger remains? Especially when you're using Linux?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |