Ransomware
Linux security myths
So what is true about Linux security and what isn't? In this article we look at common security myths when it comes to Linux.
Summary
Myth busting: Linux security
As the author of Lynis, I have to run several Linux systems for testing Linux security defenses. And if you do something long enough, some get to see you as a Linux security expert. When that happens, you get asked questions. Surprisingly they are often related to some of the myths. Time to share a few I got asked. If you received this link from me directly, then most likely you asked one :)
Linux and rise of Ransomware
The availability of ransomware on Linux is growing. This is the story behind how things started and what we can expect to be next in the near future.
Summary
Ransomware on the Linux Platform
Times are changing when it comes to Linux malware. Since a long time we had backdoors, PHP shells, and even rootkits. But it won’t take long that ransomware will catch up on the Linux platform. We hope you are reading this to counter the threat, not because it is already too late.
Ransomware invasion
Ransomware is a little devil. It encrypts your valuable data and protects it with a generated key. This key is then forwarded to the maker of the ransomware, and then it is safeguarded. The key is released upon payment, together with a decryption utility. And surprisingly, the bad guys will deliver each time. This way they know people will keep paying for ransomware intrusions.