{"id":3266,"date":"2010-07-31T18:39:22","date_gmt":"2010-07-31T22:39:22","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=3266"},"modified":"2022-12-30T15:26:21","modified_gmt":"2022-12-30T20:26:21","slug":"apple-has-most-holes","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/apple-has-most-holes\/","title":{"rendered":"Apple Has Most Holes"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3269 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Apple Has Most Holes\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/malware2-e1562622447943.jpg?resize=87%2C87&#038;ssl=1\" alt=\"Apple Has Most Holes\" width=\"87\" height=\"87\" \/>Security company <strong><a title=\"Secunia\" href=\"http:\/\/secunia.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Secunia<\/a><\/strong> is reporting that <strong><a title=\"Apple\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/strong> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) software has the <strong>most security vulnerabilities<\/strong>. According to the recent Secunia Half Year Report<strong> 2010<\/strong> (<a href=\"http:\/\/secunia.com\/gfx\/pdf\/Secunia_Half_Year_Report_2010.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) Apple has displaced <a href=\"https:\/\/www.oracle.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Oracle<\/strong><\/a> as the company with the most security vulnerabilities in its software over the first half of 2010. <strong><a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a><\/strong> retains its <strong>third-place<\/strong> spot.<\/p>\n<p><a href=\"http:\/\/www.wired.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Wired<\/em><\/a><a href=\"https:\/\/www.apple.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3270 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"apple_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/apple-e1562622593279.jpg?resize=54%2C62&#038;ssl=1\" alt=\"Apple logo\" width=\"54\" height=\"62\" \/><\/a> <a href=\"https:\/\/web.archive.org\/web\/20120104044208\/http:\/\/www.wired.com:80\/epicenter\/2010\/07\/apple-the-new-world-leader-in-software-insecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> that this does not necessarily mean that Apple&#8217;s software is the most insecure in practice. The report takes no consideration of the severity of the flaws, it points at a growing trend in the world of security flaws: the role of third-party software. Many of Apple&#8217;s flaws are not in its operating system, Mac OS X, but rather in software like Safari, <a title=\"QuickTime\" href=\"http:\/\/www.apple.com\/quicktime\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">QuickTime<\/a>, and iTunes. Vendors like <a href=\"https:\/\/www.adobe.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adobe<\/a> (with Flash and Adobe Reader) and Oracle (with Java) are similarly responsible for many of the flaws being reported. The top ten third-party applications, ranked by total number of reported vulnerabilities:<\/p>\n<p style=\"padding-left: 30px;\">1. Mozilla Firefox<br \/>\n2. <a title=\"Safari\" href=\"http:\/\/www.apple.com\/safari\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Apple Safari<\/a><br \/>\n3. Sun Java JRE<br \/>\n4. Google Chrome<br \/>\n5. Adobe Reader<br \/>\n6. Adobe Acrobat<br \/>\n7. Adobe Flash Player<br \/>\n8. Adobe AIR<br \/>\n9. <a title=\"ITunes\" href=\"http:\/\/www.apple.com\/itunes\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Apple iTunes<\/a><br \/>\n10. Mozilla Thunderbird<\/p>\n<p><a href=\"https:\/\/www.ghacks.net\/2018\/03\/11\/secunia-retires-personal-software-inspector-psi\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3271 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Secunia logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/Secunia_logo-e1562622656117-150x57.png?resize=97%2C37&#038;ssl=1\" alt=\"Secunia logo\" width=\"97\" height=\"37\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/Secunia_logo-e1562622656117.png?resize=150%2C57&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/Secunia_logo-e1562622656117.png?resize=75%2C28&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/Secunia_logo-e1562622656117.png?w=553&amp;ssl=1 553w\" sizes=\"auto, (max-width: 97px) 100vw, 97px\" \/><\/a>To illustrate this point, <a href=\"https:\/\/arstechnica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ars technica<\/em><\/a> <a href=\"http:\/\/arstechnica.com\/security\/news\/2010\/07\/apple-the-new-world-leader-in-software-insecurity.ars\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> the report includes cumulative figures for the number of vulnerabilities found on a Windows PC with the 50 most widely used programs. Five years ago, there were more first-party flaws (in Windows and Microsoft&#8217;s other software) than third-party. Since about 2007, the balance shifted towards third-party programs. Secunia predicts that third-party flaws will outnumber first-party flaws by two-to-one by the end of 2010.<\/p>\n<p>Secunia also makes a case that effectively updating third-party software is much harder to do; because Microsoft&#8217;s Windows Update and Microsoft Update systems will offer protection for around 35% of reported vulnerabilities, patching the rest requires the use of 13 or more updating systems. Some vendors\u2014Apple, Mozilla, and Google, for example\u2014do have decent automatic update systems, but others require manual intervention by the user.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3281 \" style=\"border: 0pt none;\" title=\"Steve Jobs\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/07\/stevejobs-e1562622816426.jpg?resize=268%2C141&#038;ssl=1\" alt=\"Steve Jobs\" width=\"268\" height=\"141\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120104044208\/http:\/\/www.wired.com:80\/epicenter\/2010\/07\/apple-the-new-world-leader-in-software-insecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple: The New World Leader in Software Insecurity<\/a> (wired.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security firm Secunia says Apple has the most security holes in its Half Year Report 2010 the most vulnerable are Apple Oracle Microsoft<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,420,1806,742,736,101,611,23,82,421,738,224,4,445],"class_list":["post-3266","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-aapl","tag-acrobat","tag-adbe","tag-adobe-systems","tag-apple","tag-itunes","tag-malware","tag-microsoft","tag-msft","tag-quicktime","tag-secunia","tag-security","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=3266"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3266\/revisions"}],"predecessor-version":[{"id":132915,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3266\/revisions\/132915"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=3266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=3266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=3266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}