Linux, Apple or Windows: Security-Linux Loses the 3 month vulnerabilities listing

Translate This Page

Linux, Apple or Windows: Security-Linux Loses the 3 month vulnerabilities listing

  • Comments 1

Rule one of security: Don’t assume that your software is safe.  Apple users (not Apple Corporation) make the assumption that their software is secure from viral attacks.  Is this true?  How do you determine if one system is more secure than the other?

You could ask Apple or Microsoft, or a Linux user group.  In reality both corporations  and usergroups are going to give you as honest as an answer as they can.  None of these corporations are going to cause mistrust with their customers. 

If you are a CTO, or CIO, or a student who wants to become one, you may want non-corporate related vulnerability research.

One way would be to do some research, I came up with the  I use the vulnerability database to search and compare Windows 7, Mac OS X and Linux.  I used the keywords as shown, and took the raw numeric return, included problems caused by the competing operating systems

Windows 7 over the past 3 months: 39 vulnerabilities (Keyword= Windows 7 )

Mac OS X over the past 3 months: 86 vulnerabilities (Keyword= Mac OS X )

Linux OS over the past 3 months: 118 vulnerabilities (Keyword= Linux )

Both systems appear to suffer from buffer overruns, but Mac OS X had more than Windows 7..  This is unfortunate since Apple users (again not the corporation) assume that their system is safe.  This does not mean that the security issues are only Apple OS related, or even Microsoft related, rather many of these are external vendors like Real Player or Apple Quick Time (on Windows 7), Blackberry (Both Windows and Apple), Google Chrome (Apple).  Naturally, for all three OS’s there are holes that are caused by the OS developers, it appears that stack overruns are still the largest problem.

Leave a Comment
  • Please add 3 and 2 and type the answer here:
  • Post
  • Windows over the past 3 months: 94 vulnerabilities (Keyword= Windows )

    BSD over the past 3 months: 4 vulnerabilities (Keyword= BSD )

Page 1 of 1 (1 items)
Generic Content

Legal Note:

  1. The author, Sam Stokes, is an employee of Microsoft
  2. There is no guarantee that anything I write is correct, I do try to make sure that what I write is correct.
  3. Use anything written in this blog at your own risk
  4. Test what I write about before using the information
  • Sometimes posts will disappear because I realized that they really don't fit with the total chaos of what I write about
  • Links are tested and available on date of publication, what others do with their links are out of my control


  • Whatever I write on this blog is unedited by management or anyone, which should be obvious from the randomness of the blog.  I simply write about things I like.
  • Microsoft does not restrict me in anyway, so I generallyblather about whatever I want to.
  • For personal reasons I will not write about:
    • Company confidential stuff, mainly because Microsoft is more transparent than any company I have ever worked for.
    • Other people unless they give me permission to write about them