Surprise, Windows Listed as Most Secure OS 499
david_g17 writes "According to a Symantec study reported by Information Week, Microsoft has the most secure operating system amongst its commercial competitors. The report only covered the last 6 months of vulnerabilities and patch releases, but the results place Microsoft operating systems above Mac OS X and Red Hat. According to the article, 'The report found that Microsoft Windows had the fewest number of patches and the shortest average patch development time of the five operating systems it monitored in the last six months of 2006.' The article continues to mention the metrics used in the study (quantity and severity of vulnerabilities as well as the amount of time one must wait for the patch to be released)."
Simply (Score:5, Funny)
This discussion will go as follows.
Linux geeks will pound the boards about foul play and all the vulerabilities they would exploit if they werent to busy checking dependencies.
Mac fanboys will make fun of both citing how Symantec didnt like them in the first place, because Mac people dont buy Symantec products.
Windows geeks will state how this has always been the case, but because they are the more popular OS they are a bigger target.
And finally the old unix guys will flame about how none of these vulnerabilites would have happened if we would have stayed away from GUIs.
So now that we have got that out of the way we can bypass all the leg humping and mindless dribble and get down to the real discussion...can Microsoft keep it up? Personally as a network admin I have not been too nervous the last 6 months. Since the year of the blaster MS has done a pretty good job of making up for exploits and covering their asses. All is quiet on the homefront.
Re:Simply (Score:4, Funny)
Re: (Score:3, Funny)
Re:Simply (Score:5, Funny)
Re:Simply (Score:5, Insightful)
No. Old UNIX hackers will instead berate UNIX for being a total piece of shit [simson.net] and then endlessly whine about the downfall of Symbolics [wikipedia.org] and its old dedicated LISP machines. And they'd be right.
small addition (Score:5, Informative)
And you should have added "Those of us who think there is room in the world for both Windows, OSX and Linux will remain on the sidelines while another round of the holy wars is inconclusively decided."
I am rather looking forward to the comments from Apple users, though, and particularly whether they can best their own record for self-righteous indignation and incredulity.
Re:small addition (Score:5, Interesting)
There's not only "room" for Windows, OSX and Linux, but there's a crying need for new blood in the OS arena.
Re: (Score:3, Insightful)
Actually when I said "good enough", I meant from a generic user's point of view. I haven't tried it but if you polled a few users to ask them what they'd like the next version of their system to be like, I doubt they'd come up with anything revolutionary (less malware or spam would be my guess among MS users).
As for me, after over 25 years of professional computer use, I still look every now and then at w
Re: (Score:3, Interesting)
I think the headline was misleading or perhaps edited a little too much. It should have read, "Surprise, Surprise... Windows Listed As Most Secure OS- By Symantec." It might have been more accurate if it had a few smilies tossed into it, or perhaps a [Yawn].
Intonation is everything.
Re:small addition (Score:5, Insightful)
I'll take the former over the latter anyday. Most of the nasties windows copes with are things that will ambush you when you are doing what should be totally safe things, like browsing a web site or just plain being connected to the internet without a firewall. I don't know how anyone can claim a system that is just plain unsafe to connect to the internet without spending three hours patching it and loading up defensive software is more secure than anything
Re: (Score:3, Funny)
A lot of the security fixes seen in OS X are related to applications, things like "a maliciously crafted quicktime movie could lead to elevated privleges". This is a whole world different than "a buffer overflow in the TCP stack allows remote code execution".
Most of the nasties windows copes with are things that will ambush you when you are doing what should be totally safe things, like browsing a web site or just plain being connected to the internet without a firewall.
Re: (Score:3, Insightful)
Guy 1: Windows had 50 security patches last month
Guy 2: RHEL had 500 security patches last month. Out of those, 5 were for the Linux kernel and critical system software. Rest were for Frozen Bubble and GIMP
Guy 1: Who cares, nobody will know the difference, let's say RHEL had 500 security patches
Funnily enough, Windows security comparisons never take any third-party software into consideration, while all Linux security comparis
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
You are , are you?! Well right here on
Re: (Score:3, Funny)
Re: (Score:3, Interesting)
Re:small addition (Score:5, Insightful)
That assumes that these decision-making processes were once made rationally.
Re:small addition (Score:5, Funny)
Re: (Score:3, Funny)
---
Emily Latella
GUIs? Hah! Like command lines are any better (Score:5, Funny)
Re: (Score:3, Funny)
WE programmed the executable memory with JUMPERS, because it was read-only
And if we would get rid of this amazingly insecure invention called RAM, and record the OS and application executables in PROM at the factory the way God intended, there wouldn't be any computer viruses EVER AGAIN!
Re:GUIs? Hah! Like command lines are any better (Score:5, Funny)
I would have killed for tape.
In my day we stored data on twigs and tree bark and we liked it.
And don't get me started on "binary". It was either zero or it wasn't. We didn't need no stinking ones.
Re:GUIs? Hah! Like command lines are any better (Score:5, Funny)
We had to draw our data in the sand. We hadn't heard about zeros, so we had to write them as I-I.
Re: (Score:3, Funny)
Re:GUIs? Hah! Like command lines are any better (Score:5, Funny)
Problem is, the PHB saw me doing this and told me to leave the light on. I said this would be a bad idea as it would signal the lusers that the system was in production and that they could potentially stuff the system up, especially all the batch files running that where processing data relating to the "Earth" project. The PHB ignored me and created two new limited access user accounts (Hereby called Luser1 AKA Adam and Luser2 AKA Eve).
Anyhoo, to cut a long story short, Luser2 managed to get the root password (due to a worm that the PHB infected the server with), shared it with Luser1 and managed to give themselves greater access to the info on the server. The PHB found out about this and got pretty mad with them. He deleted their user accounts, kicked them off the server and installed a firewall so that they could never again access the almighty server.
So anyway, here I am, the 21C of the "Universe" server, still watching the spawn processes of those two lusers still multiplying and changing and dealing with new problems like cooling fans starting to die.
I don't think I'll ever get this server right again.
Re: (Score:3, Interesting)
Re:Simply (Score:5, Funny)
So much sexual innuendo - so little time.
Re:Simply (Score:5, Informative)
"Mindless dribble" = "Mindless drivel", people. please. I see this so often and it grieveth me so.
-and, from previous Slashdot discussions...
"a mute point" = "a moot point"
and my absolute favorite...
"for all intensive purposes" (aaargh!) = "for all intents and purposes"
ok? fixed? I can go back to work now?
Re:Simply (Score:5, Funny)
I could care less about those grammar errors...
Re:Simply (Score:5, Funny)
Re: (Score:3, Funny)
J.
Re:Simply (Score:5, Funny)
*please mod insightful, please mod insightful*
Re:Simply (Score:4, Funny)
Actually (Score:5, Insightful)
This usually makes the "Windows is more secure" group STFU pretty quickly, for some reason. They also say "DOH!" just like Homer Simpson at least 4 times while I'm issueing my challenge. I'm really not entirely sure why...
Re:Actually (Score:5, Insightful)
But you're right. We should just ignore all those millions of systems that won't be upgraded or patched and judged them on where they are now. [google.com] Where was that again? I know that "MS Certified" IT guys shift nervously whenever you mention doing a Windows install on the raw Internet. Vista or otherwise. I wouldn't be the least bit concerned about, say, a Debian install. I'd be somewhat more worried about doing an OSX one but I have a lot more faith in the underlying system than I do about anything Microsoft could put out.
Re:Actually (Score:5, Informative)
Then I noticed the firewall wasn't even on by default at that point.
Re: (Score:3, Informative)
Re:Actually (Score:5, Insightful)
My concerns about WIndows are architectural (Score:3, Informative)
DCE/RPC underlies all DCOM calls. And OLE is built on DCOM. Note that this means that you cannot turn this network service off.
Re: (Score:3, Insightful)
If Windows were properly designed, firewalls would be nearly useless.
Re:Simply (Score:5, Informative)
Re:Simply (Score:5, Insightful)
Re:Simply (Score:5, Insightful)
Re:Simply (Score:5, Interesting)
If you DO read the article for the vulnerability counts:
Windows - 39, 12 severe, average 21 day fix
Mac - 49, 1 severe, average 66 day fix
Red Hat - 208, 2 severe, average 13 day fix
Now it looks to me like Windows performed the worst because of the large number of severe problems. This makes it more likely there are many more severe problems.
Re:Simply (Score:5, Insightful)
What you really want is the number of zero-day exploits. Vulnerabilities that are patched prior to an exploit are of far less concern than vulnerabilities that are exploited (NOT counting proof-of-concept "exploits") prior to a patch becoming available. Even I have seen reports of several zero-day exploits against WIndows in my recent memory, and I don't even use Windows or pay much attention to those notices....
If we assume that the vast majority of people who find security holes do the right thing and notify the vendor, then we can conclude that the vast majority of security holes should not be exploited prior to it being patched. From this, we can conclude from the relatively high zero-day-flaws-to-patch-count ratio that the vast majority of known Windows security holes probably remain unpatched, thus making the above numbers dramatically understated. Just a hunch.
If an operating system is more secure because the vendor has made less security fixes, that would make RedHat 1.0 the most secure OS of all. It probably hasn't had any security fixes in the better part of a decade. It's roughly equivalent to saying that the Ford Pinto is the safest car made in the last thirty years because the manufacturer only released one safety recall, while my Ford Windstar (with dual airbags, rear shoulder belts, anti-lock brakes, etc.) had at least three. See how silly that argument is? :-)
Re:Simply (Score:5, Insightful)
they call redhat everything that was on the install Discs. Yes OSX and Windows get to only be the fricking OS.
Giving redhat a mark because there was a sendmail security fix is complete utter BS.
a fairer comparison would be redhat to all microsoft products rolled together. Because that is what redhat is. It's Windows XP, windows server 2003 IIS SQL sourcesafe exchange access word excel media server media center outlook media player, etc... all together. Oh dont forget Visual studio 2005 and all it's plugins as redhat out of the box has a full development kit installed.
Call me when they do that or ignore all the server apps and other apps that come on the CD. These nimrods at symantec simply looked at errata published duting the time. redhat supports 100X more apps in the core OS than micorosft sells all together and issues fixes and errata for all of those. Microsoft tells you to pound sand when your virus scanner eats your PC.
Big difference.
Even more spectacular is the conclusion (Score:5, Funny)
The strange thing here is that they say Windows has six times as many severe vulnerabilities and conclude "... therefore Windows is *more* secure than Linux
Re: (Score:3, Interesting)
I love how Symantec's current position is that Windows should stay broken and insecure so that it doesn't destroy the Windows utilities market.
THIS JUST IN! (Score:4, Funny)
IIS (Score:5, Interesting)
Look at Secunia's page on IIS 6.0 [secunia.com], which is 3 or 4 years old: 3 vulnerabilities total, all patched and none of them seriously critical.
Re: (Score:3)
especially Apache with PHP installed
I'm not convinced it's entirely PHP's fault, either. PHP (esp. in combination with MySQL) is the VB of the Web. Just as most VB programmers often had a blatant disregard for writing clean, secure and reliable code, so do most PHP programmers. The problem with PHP is that, like VB, the learning curve is simply too low for non-programmers. Languages like C force the programmer to learn to program. Now, C is so flexible that it doesn't force good programming habits, but with C you have to learn how to wr
Re: (Score:3, Informative)
secure programming in general is very hard though some languages make it harder than others. Secure programming requires carefull consideration of many issues some of which span accross the application. It also requires good documentation (how should things be quoted at this interface? is the creator of this data trustworthy or should the data be treated as poten
What were Symantic thinking? (Score:3, Insightful)
Re: (Score:3, Interesting)
I don't know, I sort of saw it the other way around:
"Hey all you guys, listen up. I know some of you were thinking of switching to Linux or the Mac or something for improved security, but really, you're better off staying put with Windows. And by the way, did I mention that our products run on Windows?"
Maybe I'm just cynical today...
Re:Simply (Score:4, Informative)
Vista has not been out for six months (Enterprise relese was in November, commercial release was in January) so I can't really use that info for anything... "We got the most secure system... except... it is not released yet..." geee...
...and the fact that the upgrade rate to Vista are somewhere between 30% and 50% of what Microsoft estimated is also helping the statistic.
I have run NT4 and W2K for years without problems... and without reinstalling. It is possible, you just need to know what you are doing... and how to protect your system. Wait until Joe Sixpack & other lusers start to use Vista and then we will see how invincible it is.
...and btw. I do belive Vista is the most secure Windows desktop to date... but that doesn't really say very much does it ?
Re:Simply (Score:5, Funny)
(I have no problem with the post -- only with Slashdot's title for it. I would recommend something more like "Windows Is Most Secure OS, Say Flying Pigs")
Fewer patches... (Score:5, Insightful)
Re: (Score:2)
Re:Fewer patches... (Score:5, Insightful)
'The report found that Microsoft Windows had the fewest number of patches and the shortest average patch development time of the five operating systems it monitored in the last six months of 2006.'
Cool. so if I write an OS that's chock FULL of holes, and only patch three of the simplest holes in six months, patch them within an hour of being alerted to their existence, and try to keep all the others under wraps, then my OS would have fewer patches than windows and a shorter patch development time. I win. Security by obscurity wins too.
Retarded. It relies on the trust that OS vendors always patch all holes they're alerted to, AND announces every one they've patched or been alerted to. Trust like that is the beginnings of security problems in the first place.
Ive seen the evidence (Score:4, Funny)
its a blue screen that tells you
IRQ_NOT_LESS_OR_EQUAL
never been infected while ive seen that on my screen
even in Vista !
Re:Ive seen the evidence (Score:4, Informative)
Yes, but severity? (Score:5, Informative)
what i make out of that : (Score:4, Insightful)
I guess Symantec will soon be out of a job. (Score:5, Insightful)
The numbers are being misread (Score:5, Insightful)
What is this, 3rd grade?
I could stop patching Windows forever and it will be the bestest Operating System EV-ER! Like OMGWTFBBQ!
Seriously, Microsoft releases in cycles, has to perform a buttload of testing (because of the DNS patch which screwed over a lot of customers), and is slow to react to 0day problems that are brought up with theories and proofs. [They do a lot better when there is an active attack going on, I'll give you that].
I get SuSE patches for hundreds of installed packages just about every other day and install most of them automatically. The kernel I'll patch up once every 6 months or so.
Does that make me less secure than Windows? I don't know. I sure feel more secure about putting a fresh openSuSE 10.2 box on the internet unfirewalled than putting a Vista box on the Internet unfirewalled [I wonder if MSFT has actually performed this test with Vista... to see how long it takes before a basic Vista install gets compromised with the software firewall turned off].
Re:The numbers are being misread (Score:4, Informative)
Here, this will help:
"The report found that Microsoft (Quote) Windows had the fewest number of patches and the shortest average patch development time of the five operating systems it monitored in the last six months of 2006.
During this period, 39 vulnerabilities, 12 of which were ranked high priority or severe, were found in Microsoft Windows and the company took an average of 21 days to fix them. It's an increase of the 22 vulnerabilities and 13-day turnaround time for the first half of 2006 but still bested the competition handily.
Red Hat Linux was the next-best performer, requiring an average of 58 days to address a total of 208 vulnerabilities. However, this was a significant increase in both problems and fix time over the first half of 2006, when there were 42 vulnerabilities in Red Hat and the average turnaround was 13 days.
The one bright spot in all of this is that of the 208 Red Hat vulnerabilities, the most of the top five operating systems, only two were considered high severity, 130 were medium severity, and 76 were considered low.
Then there's Mac OS X. Despite the latest TV ads ridiculing the security in Vista with a Matrix-like Agent playing the UAC in Vista, Apple (Quote) has nothing to brag about. Symantec found 43 vulnerabilities in Mac OS X and a 66 day turnaround on fixes. Fortunately, only one was high priority.
Like the others, this is also an increase over the first half of the year. For the first half of 2006, 21 vulnerabilities were found in Mac OS X and Apple took on average 37 days to fix them. "
Apples = Oranges apparently (Score:5, Insightful)
Doesn't add up (Score:5, Interesting)
"Symantec found 43 vulnerabilities in Mac OS X and a 66 day turnaround on fixes. Fortunately, only one was high priority"
I fail to see how this makes Windows more secure than Mac OS X.
More bundled software, more LOC, more LP bugs (Score:5, Insightful)
Re: (Score:3, Insightful)
2) How many of them deal with applications which are bundled but disabled by default (e.g., Apache, OpenSSH)?
3) What constitutes a "critical" vulnerability? What is the relative threat level?
4) How many of those exploits were "in the wild" in terms of use?
Your method of generating "unpatched days" is also suspect. First, severity doesn't factor into the number of days and is a *really* bad multiplier in this case. It exaggerates w
yea (Score:5, Insightful)
Patch release count is probably the worst security metric that you could come up with.
Re:yea (Score:4, Insightful)
But when they count Windows vunerabilities, they don't count all of the third party apps you have to load to get the same functionality. They usually just count the base OS.
Further, Linux folks release a patch when they see a problem, M$ releases a patch when forced to by someone who's published exploit code.
Re: (Score:3, Insightful)
Also, though I haven't read TFA (I'm allergic to reports like this), I assume they meant 'Windows is the most secure commercial OS, when used in combination with a good firewall and virusscanner'. Which they coincidentally happen to sell (well, at least they think its good)...
Of course it's more secure.. (Score:4, Funny)
Gee, what a surprise (Score:5, Insightful)
This is not news. This is a Symantec marketing campaign disguised as a press release disguised as a research report.
Never mind the false conclusion that fewer patches = more secure. Never mind that both OS X (which had MOAB) and RHEL both include a lot more software than the base OS for Windows.
Re:Gee, what a surprise (Score:4, Insightful)
Well, Windows XP Pro's standard install media doesn't include 2 RDBMS packages, two different full-featured email clients, a couple different window manager package sets, a couple of widget packages, support for at least 2 programming languages, libraries to run code originally intended for another operating system's primary development framework, and two(Abiword counts?) office suites (part of the standard install for RHEL, mind you, but typically not considered "part of Windows XP")
In order for it to be an accurate comparison, we'd need to figure out what the "standard" Windows XP Professional install would be for the test, and then install (and consider) only those equivalent packages on the RHEL machine. Likewise with OS X. Both of the latter may require not-insignficant pruning of software to match the stereotypical XP+Office desktop setup (i.e. GIMP is far more complex than Paint, so it isn't really the same thing unless we were to install some arbitrary Photoshop-like-application on the XP machine).
Why Symantic Says "Windows is Good" (Score:3, Insightful)
Tell me again how a more secure Windows OS becomes good news for Symantec.
Because you have to believe Windoze can be secure before you waste money on it or Symantic.
In other news (Score:5, Insightful)
Congratulations all around Microsoft.
Correlations that are left out (Score:5, Interesting)
Again? (Score:5, Insightful)
"The total number of reported vulnerabilities for Windows was lower than for others, therefore it is the most secure."
Wow. That kind of logic would get you a failing grade in any undergraduate class. When TFA actually goes into the breakdown of "severe" versus "not severe." The article even says: and: So having 2 severe vulnerabilities makes it less secure than Windows having 12 severe vulnerabilities? Something doesn't add up. That's even assuming their numbers are correct, which I sincerely doubt. Another flaw in logic (that we've seen many times) is that the total number of publically disclosed vulnerabilities turns out to be higher for the development model that involves full-disclosure, rather than the one that involves hiding information as much as possible. This isn't exactly surprising, and says nothing about how many vulnerabilities actually exist.
Counting vulnerabilities seems like a very silly way to gauge security. It seems like a truer test would be to set up a machine (or rather, a statisically significant bunch of machines) and measure the average time to system compromise. Even this technique has its flaws, of course, but at least it's better than some arbitrary counting technique.
Survival Time Studies. (Score:3, Informative)
A more accurate measurement might be: average time to system compromise / number of attacks.
Any real world test would be better than this silly patch counting, but the number usually reported is time to ownership. People don't really care about how many attempts it takes to break a system as much as they care about how often they need to do things. It might take an attacker 100,000 tries to brute force a password, what matters is how long it took. The trick is to make sure your network looks like a t
Translation Follows: (Score:5, Funny)
Chris Mattern
A more useful summary (Score:5, Insightful)
High-severity security vulnerabilities in 2006
Windows: Q1/2=5 Q3/4=12 Total=17
RedHat Linux: Q1/2=1 Q3/4=2 Total=3
Mac OS X: Q1/2=3 Q3/4=1 Total=4
Now that's a summary I can agree with.
Re: (Score:3, Funny)
Logic (Score:5, Insightful)
Ethiopians are the healthiest people in the world because they see the fewest number of health care professionals.
Carefully chosen competitors (Score:4, Informative)
More secure... (Score:3, Insightful)
The Fine Print (Score:5, Informative)
And of course:
As always, the most secure computer is the one that is turned off, and unplugged from the network.
No security model is perfect, but I'd take any *nix for a web facing server any day.
Context and methodology (Score:5, Insightful)
The summary is that over the last 6 months, Windows had the fewest number of bugs (regardless of severity) and took the shortest amount of time to fix them.
a)What is not mentioned is that Windows had the most number of severe bugs. Windows had 12, OS X 1. But it didn't mention how many severe bugs Linux had.
b. Also what isn't noted is methodology. The time between bug and patch is mentioned but not whether time is between the bug being discovered or being announced. With open source, almost all bugs are announced when they are discovered. With closed source, it is not the same. MS has in the past sat on bugs for months, years before announcing them much less working on them.
c. This only covers the last 6 months. Why only 6 months? Surely a more representative sample would be years. In this case, MS doesn't look so good. Didn't BSD have it's 2nd bug in a decade recently?
Bad metric, questionable source (Score:3, Insightful)
Also, as others have pointed out, the metric of "Number of Patches" released is pretty much worthless. If this was a serious security test of Vista, it would have employed port scanners, malicious web pages, and assorted other threats stacked up against a default installation of the OS, on known hardware, with Vista's "security" features enabled in a known way.
For consistency's sake, the same attacks would need to be carried out against default installs of not just Linux, but OpenBSD, FreeBSD, NetBSD, and others. Then, and ONLY then, if Windows came out unscathed ahead of all those others (HA!) could it possibly be considered "most secure."
For that matter, the term "most secure" is meaningless without context. Most secure as a server? A workstation? With what skill level of user behind it?
This study seems to be, as the Immoral Bird might have put it, "lots of sound and fury, signifying nothing."
In fact, if it showed up on Usenet, it would most likely be considered a lame attempt at trolling, and subsequently killfiled.
Keep the peace(es).
A couple of things (Score:4, Insightful)
Symantec says that Windows is the most secure operating system. Why, then, would a windows user buy Symantec's products if that user is running the most secure commercial OS?
How is the number of patches that Microsoft chooses to fix a good metric? I doubt this is the case, but what if the engineers were sitting around saying "holy crap, these problems are all hard! who wants to get some coffee?" and never got around to releasing patches?
Street Cred (Score:4, Funny)
Strange analysis in article (Score:3, Interesting)
Gross Misappropriation of Context (Score:5, Informative)
The audit trail for this year's award for Best Distorting Headline:
However, that same section concludes "The risk of exploitation in the wild is a major driving force in the development of patches. As with previous periods, Microsoft Windows was the operating system that had the most vulnerabilities with associated exploit code and exploit activity in the wild (emphasis mine). This may have
How perfectly Orwellian (Score:5, Funny)
Ignorance is Strength
Windows is Secure
and
Windows is the most secure operating system. Windows has ALWAYS been the most secure operating system.
Windows is competely secure (Score:3, Funny)
Why does anyone bother to report this? (Score:4, Insightful)
Symantec has invested millions to get in bed with Microsoft and gain insider information into the workings of the OS. They are tied to the platform. Not to mention they are an anti-virus company and windows is the only platform with a large enough virus problem to keep them in business. If any other platform came to dominate the market Symantec would be out of business.
Other than that, they aren't biased at all.
So Where is Symantec AV for Unix? (Score:3, Insightful)
Consider the source (Score:3, Informative)
- created an anti-virus signature that filled up your hard drive with DIR000?? folders
- has such tenacious application installs it usually takes a reformat to get them removed
- recognizes other anti-virus applications as virus activity
- purchased Ghost a few years ago and has yet to move it forward AT ALL.
- purchased Veritas last year (maybe 2) and has nearly halted all progress on that product.
Yeah, Symantec knows what it's doing.
Re:In other unrelated news today (Score:5, Funny)
Surely you've jumped the gun. This is March 22. April 1st isn't for a few days.