{"id":49030,"date":"2016-01-05T15:41:28","date_gmt":"2016-01-05T23:41:28","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49030"},"modified":"2016-01-07T10:11:07","modified_gmt":"2016-01-07T18:11:07","slug":"dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/","title":{"rendered":"Don&#8217;t Believe Headlines That Claim OS X Was The &#8220;Most Vulnerable&#8221; Software of 2015"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49036\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-600x300.jpeg\" alt=\"half-apple-600x300\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>There is an old saying that is always worth remembering: &#8220;There are three kinds of lies: lies, damned lies, and statistics.&#8221;<\/p>\n<p>That&#8217;s the thought that\u00a0sprung to my mind in recent days as I read news stories claiming that OS X was\u00a0the most vulnerable software of the year (e.g.\u00a0<a title=\"Link to Hackread\" href=\"https:\/\/www.hackread.com\/apples-os-x-most-vulnerable-software-of-2015\/\" target=\"_blank\" rel=\"nofollow\">Hackread<\/a>, <a title=\"LInk to SC Magazine\" href=\"http:\/\/www.scmagazineuk.com\/apple-os-x-named-most-vulnerable-software-of-2015\/article\/462764\/\" target=\"_blank\" rel=\"nofollow\">SC Magazine<\/a>, <a title=\"Link to TechWorm\" href=\"http:\/\/www.techworm.net\/2016\/01\/surprise-os-x-is-the-most-vulnerable-software-of-2015-not-adobe-flash.html\" target=\"_blank\" rel=\"nofollow\">Techworm<\/a>, <a title=\"Link to Fudzilla article\" href=\"http:\/\/www.fudzilla.com\/news\/39581-apple-software-most-vulnerable-and-buggy\" target=\"_blank\" rel=\"nofollow\">Fudzilla<\/a>, and countless others&#8230;).<\/p>\n<p>The news reports stem from a report produced by <a title=\"Link to CVE Details\" href=\"https:\/\/www.cvedetails.com\/top-50-products.php?year=2015\" target=\"_blank\" rel=\"nofollow\">CVE Details<\/a>, a website that keeps count of security vulnerabilities based upon their CVE identifiers. According to CVE Details, more new CVE numbers were assigned to Apple during 2015 than any other company.<\/p>\n<p>Yes, more than Adobe or Microsoft or Google or Oracle&#8230;<\/p>\n<p>And topping CVE Details&#8217; list, as the product with the most identified security vulnerabilities of all, is Apple&#8217;s OS X operating system.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49033\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/vuln-chart.jpeg\" alt=\"Vulnerability chart\" width=\"600\" height=\"585\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/vuln-chart.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/vuln-chart-150x146.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/vuln-chart-300x293.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>According to the chart, OS X scored an impressive 384 vulnerabilities, marginally ahead of iOS at 375, and then a host of Adobe products, but clearly in front of Microsoft&#8217;s first entry \u2014 Internet Explorer \u2014 in 7th place with 231 vulnerabilities reported.<\/p>\n<p>In all, the researchers <a title=\"Link to CVE Details chart\" href=\"https:\/\/www.cvedetails.com\/top-50-vendors.php?year=2015\" target=\"_blank\" rel=\"nofollow\">counted<\/a> 654 publicly disclosed security flaws in Apple products, 83 more than Microsoft which came second in the corporate table at 571 vulnerabilities, and well ahead of Cisco (488), Oracle (479), Adobe (460), Google (323), IBM, (312), and Mozilla (188).\u00a0But again, these statistics can be misleading.<\/p>\n<p>The fundamental problem with charts like this \u2014 or rather the news stories they can generate \u2014 is that the assumption that more security advisories equates to greater vulnerability is itself, if you&#8217;ll excuse the pun, fundamentally flawed.<\/p>\n<p>Why, you ask? Because CVE Details&#8217; chart is not telling us anything about the severity of the vulnerabilities that were\u00a0found, what the potential impact was, or whether the flaws were\u00a0ever exploited in the wild.<\/p>\n<p>This means that if a company is doing a good job of finding less serious security holes, and patching them promptly, it could still end up finding itself high up in a chart of what the media might portray as &#8220;most vulnerable&#8221; software or technology company most plagued with security issues.<\/p>\n<p>In reality, a single critical security hole in a piece of software (such as a remote code execution flaw) could easily outweigh the importance of one hundred less important vulnerabilities found in another.<\/p>\n<p>Although the geek in many of us loves the idea of making lists, and ranking software and vendors in an attempt to determine who might be the least or most secure, simply counting the number of publicly disclosed vulnerabilities is not a good way to go about it.<\/p>\n<p>And, by the way, I&#8217;m not arguing that Apple is somehow perfect or that OS X isn&#8217;t troubled with security issues. A quick look back on the Intego Mac Security Blog will find any number of articles about serious vulnerabilities that have been found in Apple&#8217;s software for OS X and iOS.<\/p>\n<p>But trying to make a sensible conclusion about which software is &#8220;most vulnerable&#8221; is going to lead you down a path of lies, damn lies, and statistics&#8230;<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a title=\"Granny Slice\" href=\"http:\/\/flickr.com\/photos\/cayusa\/4402315029\">flickr photo<\/a> shared by <a href=\"http:\/\/flickr.com\/people\/cayusa\">Cayusa<\/a> under a <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">Creative Commons ( BY-NC ) license<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>News reports have claimed that Mac OS X is the &#8220;most vulnerable&#8221; software of 2015.  But can that really be true?<\/p>\n","protected":false},"author":34,"featured_media":49039,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,11],"tags":[3151,69,168,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"News reports have claimed that Mac OS X is the &quot;most vulnerable&quot; software of 2015. But can that really be true?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t Believe Headlines That Claim OS X Was The &quot;Most Vulnerable&quot; Software of 2015 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"News reports have claimed that Mac OS X is the &quot;most vulnerable&quot; software of 2015. But can that really be true?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-05T23:41:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-07T18:11:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/\",\"name\":\"Don't Believe Headlines That Claim OS X Was The \\\"Most Vulnerable\\\" Software of 2015 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage\"},\"datePublished\":\"2016-01-05T23:41:28+00:00\",\"dateModified\":\"2016-01-07T18:11:07+00:00\",\"description\":\"News reports have claimed that Mac OS X is the \\\"most vulnerable\\\" software of 2015. But can that really be true?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t Believe Headlines That Claim OS X Was The &#8220;Most Vulnerable&#8221; Software of 2015\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Don&#8217;t Believe Headlines That Claim OS X Was The &#8220;Most Vulnerable&#8221; Software of 2015\",\"datePublished\":\"2016-01-05T23:41:28+00:00\",\"dateModified\":\"2016-01-07T18:11:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage\"},\"wordCount\":521,\"commentCount\":7,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg\",\"keywords\":[\"Apple\",\"iOS\",\"OS X\",\"Vulnerability\"],\"articleSection\":[\"Apple\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"News reports have claimed that Mac OS X is the \"most vulnerable\" software of 2015. But can that really be true?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/","og_locale":"en_US","og_type":"article","og_title":"Don't Believe Headlines That Claim OS X Was The \"Most Vulnerable\" Software of 2015 - The Mac Security Blog","og_description":"News reports have claimed that Mac OS X is the \"most vulnerable\" software of 2015. But can that really be true?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-01-05T23:41:28+00:00","article_modified_time":"2016-01-07T18:11:07+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/","name":"Don't Believe Headlines That Claim OS X Was The \"Most Vulnerable\" Software of 2015 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage"},"datePublished":"2016-01-05T23:41:28+00:00","dateModified":"2016-01-07T18:11:07+00:00","description":"News reports have claimed that Mac OS X is the \"most vulnerable\" software of 2015. But can that really be true?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t Believe Headlines That Claim OS X Was The &#8220;Most Vulnerable&#8221; Software of 2015"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Don&#8217;t Believe Headlines That Claim OS X Was The &#8220;Most Vulnerable&#8221; Software of 2015","datePublished":"2016-01-05T23:41:28+00:00","dateModified":"2016-01-07T18:11:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#webpage"},"wordCount":521,"commentCount":7,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg","keywords":["Apple","iOS","OS X","Vulnerability"],"articleSection":["Apple","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/dont-believe-headlines-that-claim-os-x-was-the-most-vulnerable-software-of-2015\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/half-apple-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cKO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49030"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49030"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49030\/revisions"}],"predecessor-version":[{"id":49093,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49030\/revisions\/49093"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/49039"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}