I just wanted to follow-up on this thread: OMG. Have I just spammed myself???
How are people opening suspicious e-mails? Let's say you have an e-mail you can't tell if it's legit so you want to open. I have AV installed but I'd like to give spammers credit and think they have some new exploit that the AV companies haven't tagged. So what to do?
I have a KVM virtualization host I use just for fun and I use virtualbox on my main PC. I could make a VM but I'd be worried that whatever virus that'd infect the VM would infect the whole virtulization host. It's not too hard to add one line of code to see it's a KVM machine and then to deploy code against the hypervisor.
Any best practice? Or do people here think most are just looking for Windows / OSX users to infect and aren't going to be sophisticated enough to attack hypervisors? I have backups but if someone cryptolocked my PC or even the junk KVM host it'd be a bad day or two.
How are people opening suspicious e-mails? Let's say you have an e-mail you can't tell if it's legit so you want to open. I have AV installed but I'd like to give spammers credit and think they have some new exploit that the AV companies haven't tagged. So what to do?
I have a KVM virtualization host I use just for fun and I use virtualbox on my main PC. I could make a VM but I'd be worried that whatever virus that'd infect the VM would infect the whole virtulization host. It's not too hard to add one line of code to see it's a KVM machine and then to deploy code against the hypervisor.
Any best practice? Or do people here think most are just looking for Windows / OSX users to infect and aren't going to be sophisticated enough to attack hypervisors? I have backups but if someone cryptolocked my PC or even the junk KVM host it'd be a bad day or two.