Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 26 November 2012

What? Apple leads in vulnerabilities? AND What the heck is Moodle?

Posted on 16:43 by Unknown
I was as surprised as everyone else when Trend Micro released their Malicious Top Ten for Q3 2012 and found Apple at the top of the list of vendors with the most vulnerabilities.

RankVendorNumber of Reported
Vulnerabilities

3Q 2012
VendorNumber of Reported
Vulnerabilities

2Q 2012
1Apple163Oracle         97
2Moodle93Linux         76
3Google72Google         74
4Oracle71Microsoft         55
5Mozilla57Mozilla         48
6Cisco55Cisco         45
7IBM53IBM         37
8Ffmpeg53Adobe         27
9Adobe42Apple         26
10Microsoft35HP         24


Maybe this will shut up some of those Apple snobs that sneer at PC products and brag about how secure Apple products are?  Nah, probably not!

In case you're wondering what the heck Moodle is and why it's number 2 on the list, you're not alone.  I had to look it up too.  It's an open source authoring language for teachers who want to write their own teaching applications.  Good luck with that one Rocky!  I even found a YouTube intro for it.  Based upon the quality of the presentation, I won't be trying it out any time soon.

http://www.youtube.com/watch?v=mXBdNdPUwKA

Open Source:  For those too cheap to buy programs from companies that have quality control departments.

"QC?  QC?  We don't got no stinking QC!"

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ►  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ▼  2012 (12)
    • ►  December (2)
    • ▼  November (8)
      • New Malware That Hides Your Data
      • What? Apple leads in vulnerabilities? AND What t...
      • Microsoft Windows 8 - Introducing Chaos In The Wor...
      • Addressing Data Ownership In The Cloud
      • Malware on Mobile devices like Smartphones and Tab...
      • Helping a Client With e-Discovery
      • Portable Device Security On Your Network
      • Conventions in the Cloud? Where will it all end?
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile