TL;DR - About switching from Linux Mint to Qubes OS from among various other options that try to provide security out-of-the-box (also discussed: OpenBSD, SculptOS, Ghaf, GrapheneOS)

  • MouldyCat@feddit.uk
    link
    fedilink
    arrow-up
    4
    ·
    1 day ago

    often social eng attacks rely on a vulnerability as well e.g. getting your mark to open an Excel file that exploits a vulnerability in MS Office.

    • non_burglar@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      22 hours ago

      Sure, but if the compromise stays within its own app, like for a browser, sandboxing won’t help.

      The bulk, and I mean like 95% of the compromises I see are normal employees clicking on things that “look legit”.

      Excel is now wrapped in a browser. Discord, almost all work apps are all wrapped in a browser. So you can be completely locked down between apps like grapheneos, but if you are choosing to open links, no amount of sandboxing is going to save you.

      This is why we deploy knowbe4 and proofpoint, cause people are a liabilities, even to themselves.

      • FoundFootFootage78@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 hours ago

        Clicking on things that look legit is a critical part of interaction with computers. Programs should not be installed unintentionally, so first and foremost Office Macros should not be enabled by default (and eventually Microsoft did disable them).

        Recently I think the main avenue for malware is to send a PDF with a fake popup for an update, that links to a phishing site and prompts you to download an exe with malware. That kind of thing is a harder issue to solve, but at the very least an OS should probably not let that program update your BIOS.