Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux's security. Wrong. Windows malware, whether it comes in the form of a Trojan, virus, or worm, works by exploiting security holes in either the operating system itself or an application like Adobe Reader or Internet Explorer.
Whatever the bug or the method it uses to arrive on a Windows PC, the fundamental way it uses to exploit the system is that Windows itself is inherently insecure.

While Chuck Norris runs on Linux-based DSL modems and routers, it doesn't actually attack Linux at all. Instead, it runs as a normal Linux application. So how does it get there if it doesn't try to crack Linux? It infects routers by trying common and default passwords. That's it. That's all there is to it.

To blame Linux because someone is so dumb as to not change the default password is kind of like blaming Honda or Ford for their car anti-thief systems for not preventing your car from being stolen if you left the doors unlocked and the key in the ignition. At some point, the user has to take responsibility for basic security and this most recent assault on modems and routers is a perfect example.

The link for this article located at IT World is no longer available.