{"id":37621,"date":"2015-02-25T09:48:13","date_gmt":"2015-02-25T17:48:13","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=37621"},"modified":"2015-02-26T09:18:54","modified_gmt":"2015-02-26T17:18:54","slug":"mac-osx-ios-security-vulnerability-chart","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/","title":{"rendered":"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37633\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-600x300.jpeg\" alt=\"Security holes\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here is some news which will upset the Apple fanboy in all of us.<\/p>\n<p>A new report has found that the number of high severity security vulnerabilities increased in 2014, and the Mac OS X and iOS operating systems dominate the chart, while Windows recedes.<\/p>\n<p>In short: security researchers\u00a0are saying that\u00a0<a title=\"Link to ZD Net report\" href=\"http:\/\/www.zdnet.com\/article\/mac-os-x-is-the-most-vulnerable-os-claims-security-firm\/\" target=\"_blank\" rel=\"nofollow\">Mac OS X is the most vulnerable operating system<\/a> out there.<\/p>\n<p>In total, 147 vulnerabilities were reported in OS X during 2014, with 64 rated as &#8220;high severity.&#8221; Those are the most serious vulnerabilities that could be exploited by an attacker remotely. Meanwhile, 67 of the vulnerabilities were given a medium severity.<\/p>\n<p>A combined\u00a0127 vulnerabilities were reported for iOS, with 32 of the security flaws rated high severity, and 72 medium.<\/p>\n<p>Steel yourself, and take a quick look at the chart produced by security firm GFI:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37624\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/os-vulns.jpeg\" alt=\"Operating system vulnerabilities\" width=\"600\" height=\"310\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/os-vulns.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/os-vulns-150x77.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/os-vulns-300x155.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The chart doesn&#8217;t seem to be entirely fair from my perspective. For instance, each version of Microsoft Windows gets its own entry\u2014but Apple operating systems have their different versions lumped together.<\/p>\n<p>Still, there&#8217;s a clear message here that Apple OSes are frequently the subject of serious vulnerability discovery. Something that may be a shock to those who dream that their devices &#8220;just work&#8221; perfectly.<\/p>\n<h3>The Good, The Bad, and The Ugly<\/h3>\n<p>If you wanted to try to put a positive spin on things, you might argue that it is\u00a0<em>good<\/em> that so many vulnerabilities are being found on Apple operating systems, as that (hopefully) means they are getting patched promptly and <em>who knows<\/em> how many more severe vulnerabilities there might be in, say, Windows that as yet lie undiscovered.<\/p>\n<p>You might also convince yourself that it doesn&#8217;t matter that much just how many vulnerabilities are found in an operating system, but how actively attackers are attempting to exploit them in order to compromise systems or infect them with malware.<\/p>\n<p>It&#8217;s well known, for instance, that the number of new malware variants created for Macs is tiny compared to the onslaught analysed on Windows by anti-virus labs every day.<\/p>\n<p>Not that any of this means that you shouldn&#8217;t take security seriously, of course, and this doesn&#8217;t negate the importance of applying security updates and running <strong><a title=\"Mac Antivirus and Security | Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac\u00a0anti-virus<\/a><\/strong> software. In an ideal world, these vulnerabilities should have been found and fixed before the software ever shipped out of Cupertino.<\/p>\n<p>Every vulnerability found may be good news (&#8220;it&#8217;s been found!&#8221;), but it&#8217;s also a failure of quality control and testing.<\/p>\n<p>Interestingly, things take a less Apple-y turn when you examine the chart showing not the list of operating systems with the most vulnerabilities\u2014but the chart of applications with the most reported vulnerabilities.<\/p>\n<p>And what do we find? Microsoft Internet Explorer is riddled with so many security holes that you might as well think of it as the Swiss cheese of web browsers.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37627\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/app-vulns.jpeg\" alt=\"Application vulnerabilities\" width=\"600\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/app-vulns.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/app-vulns-150x87.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/app-vulns-300x175.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Bet you&#8217;re glad that you can&#8217;t get Internet Explorer for your Mac any more, aren&#8217;t you? \ud83d\ude42<\/p>\n<p>And it&#8217;s no surprise at all to see familiar faces like Adobe Flash and Java taking a prominent position in this list alongside the most popular browsers.<\/p>\n<h3>Multi-Layered Approach to Security<\/h3>\n<p>In a nutshell, the takeaway from studies like this is not to crow about how much better one operating system might be than another one, but instead to remember that security must be taken seriously whatever flavour of OS you decided to run on your computer.<\/p>\n<p>Basically, keep your security patches up to date or suffer the consequences! This highlights the fact that a\u00a0<a title=\"Layers of Protection for the Life On Your Mac\" href=\"https:\/\/www.intego.com\/company\/infographic\/layers-of-protection\" target=\"_blank\">multi-layered approach to security<\/a> is the best method to protect\u00a0your digital life from the bad guys.<\/p>\n<p>Which is very easy for us to say, but not always easy for the average computer user to do. Because, obviously, there are still many people using older versions of OS X and iOS who might not be able to update their iPhones or iMacs, because their hardware no longer supports the latest and greatest (and safest) version.<\/p>\n<p>Even though Apple has made some things better by making OS updates available for free, I do wish that they made more efforts to support legacy versions of their operating systems with security updates.<\/p>\n<p>It&#8217;s more effort for them to do, of course, but surely those users who made a purchase a few years ago deserve to be kept updated against the latest security vulnerabilities as much as those who just bought a shiny new gadget in the Apple Store last weekend?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every vulnerability found may be good news (&#8220;it&#8217;s been found!&#8221;), but it&#8217;s also a failure of quality control and testing.<\/p>\n<p>Are you surprised to see OS X and iOS top the chart?<\/p>\n","protected":false},"author":34,"featured_media":37648,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[3151,69,174,87,168,143,144,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Every vulnerability found may be good news (&quot;it&#039;s been found!&quot;), but it&#039;s also a failure of quality control and testing.  Are you surprised to see OS X and iOS top the chart?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Every vulnerability found may be good news (&quot;it&#039;s been found!&quot;), but it&#039;s also a failure of quality control and testing.  Are you surprised to see OS X and iOS top the chart?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-25T17:48:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-26T17:18:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/\",\"name\":\"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage\"},\"datePublished\":\"2015-02-25T17:48:13+00:00\",\"dateModified\":\"2015-02-26T17:18:54+00:00\",\"description\":\"Every vulnerability found may be good news (\\\"it's been found!\\\"), but it's also a failure of quality control and testing. Are you surprised to see OS X and iOS top the chart?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows\",\"datePublished\":\"2015-02-25T17:48:13+00:00\",\"dateModified\":\"2015-02-26T17:18:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage\"},\"wordCount\":743,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg\",\"keywords\":[\"Apple\",\"iOS\",\"Mac\",\"Microsoft\",\"OS X\",\"Vulnerabilities\",\"Vulnerability\",\"Windows\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Every vulnerability found may be good news (\"it's been found!\"), but it's also a failure of quality control and testing.  Are you surprised to see OS X and iOS top the chart?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/","og_locale":"en_US","og_type":"article","og_title":"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows - The Mac Security Blog","og_description":"Every vulnerability found may be good news (\"it's been found!\"), but it's also a failure of quality control and testing.  Are you surprised to see OS X and iOS top the chart?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-02-25T17:48:13+00:00","article_modified_time":"2015-02-26T17:18:54+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/","name":"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage"},"datePublished":"2015-02-25T17:48:13+00:00","dateModified":"2015-02-26T17:18:54+00:00","description":"Every vulnerability found may be good news (\"it's been found!\"), but it's also a failure of quality control and testing. Are you surprised to see OS X and iOS top the chart?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"OS X and iOS Vulnerabilities Top Security Vulnerability Chart, Far Ahead of Windows","datePublished":"2015-02-25T17:48:13+00:00","dateModified":"2015-02-26T17:18:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#webpage"},"wordCount":743,"commentCount":9,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg","keywords":["Apple","iOS","Mac","Microsoft","OS X","Vulnerabilities","Vulnerability","Windows"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-osx-ios-security-vulnerability-chart\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/02\/apple-cheese-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9MN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37621"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=37621"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37621\/revisions"}],"predecessor-version":[{"id":37657,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37621\/revisions\/37657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/37648"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=37621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=37621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=37621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}