not_IO@lemmy.blahaj.zone to Technology@lemmy.worldEnglish · 5 days agopublic services of an entire german state switches from Microsoft to open source (Libreoffice, Linux, Nextcloud, Thunderbird)euro-stack.comexternal-linkmessage-square256fedilinkarrow-up11.6Karrow-down110file-text
arrow-up11.59Karrow-down1external-linkpublic services of an entire german state switches from Microsoft to open source (Libreoffice, Linux, Nextcloud, Thunderbird)euro-stack.comnot_IO@lemmy.blahaj.zone to Technology@lemmy.worldEnglish · 5 days agomessage-square256fedilinkfile-text
minus-squaretempest@lemmy.calinkfedilinkEnglisharrow-up56·5 days agoThe hacker community it’s very focused on Linux since most servers in the world run it. The fly by night script kiddies and botnet creators definitely prefer end user systems though.
minus-squareTja@programming.devlinkfedilinkEnglisharrow-up10arrow-down3·5 days agoThis right here. Linux security is so good that the easiest way to break in is via Phishing someone with a windows laptop.
minus-squareMangoCats@feddit.itlinkfedilinkEnglisharrow-up2·4 days agoThe old jibe was that Windows users are so gullible that they’re just easier to phish.
minus-squareLv_InSaNe_vL@lemmy.worldlinkfedilinkEnglisharrow-up2·4 days agoYeah exactly. Nobody actually “hacks” anymore. They just send Pam in accounting a funny email
minus-squareMangoCats@feddit.itlinkfedilinkEnglisharrow-up1·4 days agoThe easiest hacks use social engineering. Much more social to exploit in the end-user arena.
The hacker community it’s very focused on Linux since most servers in the world run it. The fly by night script kiddies and botnet creators definitely prefer end user systems though.
This right here. Linux security is so good that the easiest way to break in is via Phishing someone with a windows laptop.
The old jibe was that Windows users are so gullible that they’re just easier to phish.
Yeah exactly. Nobody actually “hacks” anymore. They just send Pam in accounting a funny email
The easiest hacks use social engineering. Much more social to exploit in the end-user arena.