Just when you thought Linux was safe, there comes along a well-documented threat that demonstrates the OS’s vulnerability. In September, the program Linux.Slapper.Worm spread itself through some 10,000 servers running the Apache Web server software. Though it was not considered a serious threat (the virus rated a 2 out of 5 on Symantec’s severity scale), the worm installed backdoors, set up peer-to-peer networks between hundreds of infected systems and launched countless denial-of-service attacks. This incident wasn’t the first virus to hit Linux, and it certainly won’t be the last. “As the installed base of Linux grows, we expect to see more such incidents,” says Kevin Haley, group product manager at antivirus software maker Symantec in Cupertino, Calif. And because the Linux community has reached a critical mass of millions, Linux.Slapper.Worm spells Linux’s coming of age as a security target. IDC analyst Dan Kusnetzky says that of the 5.7 million server OS licenses sold in 2001, about one in four (26 percent) were Linux. Forty-nine percent were for Windows, and another 12 percent were for Unix, he says. (IDC and CIO’s publisher have the same parent company.) IDC estimates that every paid Linux license spawns between 12 and 15 replicas. That’s a tempting target for virus writers, Haley says. “As the installed base grows, we expect to see more incidents,” he warns.But don’t panic. Linux viruses, which now make up about 1 percent of the Sophos antivirus library, probably won’t become commonplace, says Jack Cooper, the former CIO of drug company Bristol-Myers Squibb who founded JM Cooper & Associates, a supply chain and ERP consultancy. “Linux is built around the Unix security model, which is a relatively uninhabitable place for viruses,” he says. Linux and its accompanying Apache Web server “have been exposed, attacked and patched for a much longer time than comparable Microsoft products,” he says. The Linux community “bands together to fix the problem” when one gets identified, adds Kusnetzky. That’s comforting. But don’t expect a panacea. “As soon as you say you don’t have a problem, somebody will try to prove you wrong,” Symantec’s Haley says. “Never underestimate the determination of a rogue programmer.” Related content brandpost Sponsored by Catchpoint Systems, Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Generative AI Generative AI feature 10 business intelligence certifications and certificates to advance your BI career From BI analysts and BI developers to BI architects and BI directors, business intelligence pros are in high demand. Here are the certifications and certificates that can give your career an edge. By Thor Olavsrud Dec 01, 2023 8 mins Certifications Business Intelligence IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe