are these attacks windows specific or ?
Well it depends on what you're asking.
There are two levels at play:
1. Someone is attacking web sites via some vulnerabilities in their software (old vulnerable sw versions, security issues in the actual web sites themselves etc). These are very often running linux or bsd, but also sometimes Windows. Sometimes the access to the system is gained by stealing the login credentials by attacking a desktop/laptop of the administrator.
2. The successfully breached websites are programmed by distribute malware. The motive in this case is money: The attackers "lease" the hacked sites and distribute tailored malware for whoever is willing to pay. Typically the malware is a
rootkit that'll
man-in-the-browser normal bank transactions to steal money. In most (if not all) cases these malwares target Windows platform. That's only because most of the potential victims are using Windows. If OS X continues to gain ground it will be targeted as well at some point.
So at different levels the attacks are targeting different platforms.
RecommendationsSystem administratorsKeep your host operating system up to date with security updates. Keep track of security updates of the actual web application platforms as well, and install new security updates as soon as they arrive (of course using staging host to verify that everything works fine after installing the upgrade). You can follow the
Full Disclosure mailing list to keep track of recent activity on the security front. There are also numerous RSS/Twitter feeds you can follow, but I find those a bit tiresome in the long run. YMMV.
End usersWindows users need to be very careful to maintain security of their systems and installed applications. I can recommend
Secunia PSI to all windows users. This tool will check all installed applications for old versions and (optionally) automagically install the required updates.
OS X users should install the OS security updates as soon as they arrive. For application updates there's
AppFresh tool which works somewhat similar to Secunia PSI. It's not as good as PSI, but best I've found for OS X so far.
Linux/BSD users should install security updates weekly.
While OS X / Linux/BSD users might not be targets for the most attacks, that's really no excuse to skip the security updates. Sometimes vulnerabilities in these systems are actually exploited and the feeling of false security the users of these systems might have can lead to some rather nasty surprises (say for example storing tons of confidential material on the systems in belief no-one can possibly breach the system...).