The difference is that it's more difficult to infect Linux. This is due to the fact that it provides a multi-user system, so until the user doesn't log into an administrator account, the virus will not be able to express itself in the operating system. In addition, Linux uses the dependency packages, you can not turn on package A, if your computer does not have package B and so on. All computers can be different depending on packages, therefore, the virus creator has to guess what this dependency is in order for its virus to work. The most dangerous malware for Linux today is rootkit. Let's take a closer look at what it is.
...are the most dangerous malware not only for Linux, but also for other operating systems. They are able to penetrate into the computer undetected by Antivirus. Usually they appear not alone, but with additional malware that they hide with them.
What harm can they cause?
Capturing the computer system, they bring with them more and more "pests" to use the computer for criminal purposes, such as to make mass mailings. Even when the virus is not active (in the closed document), it can read your passwords and other personal data.
How do they get into the computer?
The easiest way is through a document in an e-mail. As soon as you open the document in which the rootkit hides, the pest is activated and penetrates into your computer system, unbeknownst to you. The virus does not reproduce, but can move from file to file. It is also easy to get rootkit into your computer when you open a link to a site that was hacked.
How can you deal with this?
To understand whether there are rootkits on your computer, you can use a program called RkHunter. The usual anti-virus cannot detect rootkits, so it is necessary to use special software, and it is better to use several applications at once. Alternatively, you can try Gmer and AVG Anti-Rootkit. Alone they cannot cope with its task100%, but used together are able to clean your computer from pests.
Finally here are some recommendations of colleagues for your computer's security: Try to use your administrative account as little as possible. Do not open e-mails, especially attachments, in emails from strangers. Do not visit questionable sites.
Carefully read the links when using popular sites, for example, hackers can "shove" you completely identical to the original windows for entering into facebook, but the link in the address bar is one letter different from the original, for example, not facebook.com, but facebok.com.