A Microsoft executive Wednesday said Windows Vista’s first 90 days were a huge security success when compared to the opening three months of Windows XP, the current Apple Mac OS X, and three flavors of Linux.Jeff Jones, the strategy director in Microsoft’s security technology unit, tallied up vulnerabilities patched during the first 90 days of Vista, XP, Mac OS X 10.4, Red Hat Enterprise Linux 4 Workstation, Ubuntu 6.06 LTS and Novell SuSE Linux Enterprise Desktop 10.He gave Vista the checkered flag.“Vista has an improved security vulnerability profile over its predecessor, and a significantly better profile relative to comparable modern competitive operating systems,” Jones asserted in his blog. By his count, Vista has been hit by just one vulnerability since its introduction to enterprises at the end of November. The bug, which was in the antimalware scanning engine used by the bundled-with-Vista Windows Defender, was patched last month. By comparison, said Jones, in their first 90 days, Windows XP was nailed with 14 bugs, Mac OS X 10.4 (Tiger) with 20, Red Hat with 137, Ubuntu with 71 and SuSE with 80.Even when vulnerabilities that were disclosed but not patched are added in, Vista still comes out far ahead. Its five total bugs—one patched, four made public but not fixed as of Feb. 28—compared favorably with XP’s total of 18, Mac OS X’s 27, Red Hat’s 201, Ubuntu’s 100 and SuSE’s 111. “As an early and tentative indicator, this is good news for Windows Vista security,” said Jones in a report he issued of his findings (download PDF).But simply counting up vulnerabilities, patched or not, doesn’t tell the whole story, argued Oliver Friedrichs, senior director of Symantec’s security response team.“The severity of [a] vulnerability plays into this too,” Friedrichs said Thursday. “A single vulnerability that has a high severity could lead to the next Sasser or Blaster [worm], but an OS with a larger [bug] count, but with [ones rated] less high may be in a better defensive position overall.”Likewise, Friedrichs said, comparing Windows to any other operating system is always dicey because of the overwhelming market share Microsoft’s products enjoy. That means flaws in Windows are much more likely to be exploited by attackers.“A high-severity vulnerability may not receive widespread exploitation on another OS,” Friedrichs said. “That’s not uncommon. It doesn’t diminish the criticality of the vulnerability itself, of course. For that vendor’s customer base it does present a serious risk, but the overall risk to the Internet may not be much.”Friedrichs also questioned whether 90 days of Vista was an apples-to-apples comparison with XP or other operating systems, what with Vista’s two-stage rollout. “This [scorecard] started the day it shipped to enterprises, but they have a much, much slower [Vista] adoption rate than consumers. The fact is, the installed base of Vista has not grown as quickly as did XP’s in its first 90 days.” Apparently that applies to hackers too. “Attackers have in many cases not had ready access to the platform for the entire 90 days,” Friedrichs said.Still, Microsoft is doing something right, said Friedrichs, who pulled numbers from Symantec’s recently published Internet security threat report. In the last six months of 2006, Microsoft patched a sample set of 39 vulnerabilities in an average of 21 days, the fastest of a group of OS vendors that also included Sun Microsystems, Hewlett-Packard, Apple and Red Hat. Apple, for example, took an average of 66 days to issue fixes for its Mac OS X vulnerabilities, while Red Hat’s average was 58 days. HP and Sun lagged far behind, with averages of 101 and 122 days, respectively.“Microsoft was clearly the best,” Friedrichs said.Jones and Friedrichs agreed on one thing: 90 days is an awfully early spot to benchmark. “It is too soon to get a complete picture,” Jones acknowledged in his report. “The first 90 days may not be the best measurement,” Friedrichs said. “With the [security] improvements Microsoft has made, we would expect that the OS is more secure. But is that meaningful in the long term?“Hackers are moving away from attacking the core OS, and are focusing on third-party applications and third-party drivers,” he said. “So in the future, though it may be likely that Microsoft will be less to blame for attacks because it’s invested in [Vista’s] security, the overall volume of attacks or exploits will not diminish.”-Gregg Keizer, Computerworld Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe