Security by obscurity — NOT!
As you can see in the posts below I switched internet service providers on Monday of this week. As a result I received a different block of IP addresses than I had before.
I have always heard that it only takes a few minutes for an attack to start on a computer – or any other device like phones and tablets – that is newly connected to the Internet. I determined to see how many (not if) script-kiddie attacks via SSH took place on the first full day after the changeover.
During the full day after getting new IP addresses, I experienced a total of 1634 attack attempts from 37 different IP addresses. I obtained this information from the Logwatch tool which I describe in volumes 2 and 3 of my “Using and Administering Linux: Zero to SysAdmin” series of books.
The crackers behind these attempts are not just searching for new computers to attack. They make the assumption that there is a computer at every IP address and attack regardless. If there is no computer at one IP address they move on to the next.
The point is that your computer or device is not safe just because it was connected to the internet five minutes ago. There are constant attacks going on and your device needs to be protected before it is connected.
Note that this is only one type of attack. There are many others that I did not even consider in this post.
More Stories
Securely erasing your data on Linux
Many people choose to encrypt their disk drives because it ensures that their data stays secure and safe from the...
Perfctl malware infects thousands of Linux hosts since 2021
ArsTechnica has an article about the thousands of Linux systems infected by this well-designed malware that's been dubbed Perfectl. The...
Secure electronic document disposal with Linux
We can't be too careful about ensuring that our personal data is safe, both paper documents and electronic ones. I'm...
Windows security just got worse
Well, it didn't really get any worse, we just found another way in which it's already horrible. Like you, I...
Signal: The Pinnacle of Secure Messaging
In a time of increasing digital privacy threats, Signal has emerged as a hope for those seeking secure and private...
Linux Malware scanning using ClamAV
Image via Creative Commons, modified by Both.org Introduction There are many different ways of protecting a system, right from keeping...