	{"id":672,"date":"2009-02-12T14:57:21","date_gmt":"2009-02-12T13:57:21","guid":{"rendered":"http:\/\/blog.intego.com\/?p=672"},"modified":"2009-02-12T14:57:21","modified_gmt":"2009-02-12T13:57:21","slug":"apple-stays-at-the-top-of-operating-system-vulnerability-league-table","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/","title":{"rendered":"Apple Stays at the Top of Operating System Vulnerability League Table"},"content":{"rendered":"<p>IBM has issued its <a href=\"http:\/\/www-935.ibm.com\/services\/us\/iss\/xforce\/trendreports\/xforce-2008-annual-report.pdf\">X-Force 2008 Trend and Risk Report<\/a>, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes the top spots for the most vulnerabilities reported. &#8220;X-Force tracks vulnerabilities by platform and has produced metrics this year to show the operating systems with the most disclosed vulnerabilities.&#8221; The results are as follows:<\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif\"><\/p>\n<p> The report goes on to say, &#8220;Several operating systems have remained in the top five list over the past three years,&#8221; and the top five list begins with Mac OS X and Mac OS X Server. As we reported in our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/images\/yims2008.pdf\">Year in Mac Security 2008<\/a>, Apple issued 35 security updates in 2008 for Mac OS X and related software (iLife, QuickTime, etc.). The IBM report confirms the increasing number of security threats in Mac OS X, and highlights how this has been the case for the past three years.<\/p>\n<p> This report contains a wealth of other information about computer security, discussing malware, spam, phishing, browser issues and more. It&#8217;s an interesting read for those who want to know what&#8217;s hot and what&#8217;s not in computer security, and to keep up with the trends of different security issues.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes the top spots for the most vulnerabilities reported. &#8220;X-Force tracks vulnerabilities by platform and has produced metrics this year to show the operating systems with the most [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Stays at the Top of Operating System Vulnerability League Table - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-02-12T13:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/\",\"name\":\"Apple Stays at the Top of Operating System Vulnerability League Table - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage\"},\"datePublished\":\"2009-02-12T13:57:21+00:00\",\"dateModified\":\"2009-02-12T13:57:21+00:00\",\"description\":\"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Stays at the Top of Operating System Vulnerability League Table\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Apple Stays at the Top of Operating System Vulnerability League Table\",\"datePublished\":\"2009-02-12T13:57:21+00:00\",\"dateModified\":\"2009-02-12T13:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/","og_locale":"en_US","og_type":"article","og_title":"Apple Stays at the Top of Operating System Vulnerability League Table - The Mac Security Blog","og_description":"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-02-12T13:57:21+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/","name":"Apple Stays at the Top of Operating System Vulnerability League Table - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage"},"datePublished":"2009-02-12T13:57:21+00:00","dateModified":"2009-02-12T13:57:21+00:00","description":"IBM has issued its X-Force 2008 Trend and Risk Report, a summary of the computer security landscape for the previous year, and, once again, Mac OS X takes","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Stays at the Top of Operating System Vulnerability League Table"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Apple Stays at the Top of Operating System Vulnerability League Table","datePublished":"2009-02-12T13:57:21+00:00","dateModified":"2009-02-12T13:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#webpage"},"wordCount":207,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-stays-at-the-top-of-operating-system-vulnerability-league-table\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/app_vuln_2008.gif","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aQ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/672"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}