GravitySpoiled@lemmy.ml to linuxmemes@lemmy.world · 1 year agoYou have no power herelemmy.mlimagemessage-square25fedilinkarrow-up128arrow-down12
arrow-up126arrow-down1imageYou have no power herelemmy.mlGravitySpoiled@lemmy.ml to linuxmemes@lemmy.world · 1 year agomessage-square25fedilink
minus-squareOoops@kbin.sociallinkfedilinkarrow-up2arrow-down1·1 year agoMalware for desktop users is the low hanging fruit with little rewards. You just hear about it because it’s so rediculous easy. The real money is on servers, so that’s were real money/work is invested to develop malware for much higher gains. How successful are they again?
minus-squareGork@lemm.eelinkfedilinkarrow-up1·edit-21 year agoI think you’re right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector. A server on the other hand can access all of that stuff across an entire organization.
Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it’s so rediculous easy.
The real money is on servers, so that’s were real money/work is invested to develop malware for much higher gains. How successful are they again?
I think you’re right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector.
A server on the other hand can access all of that stuff across an entire organization.