What a ridiculous steaming pile of garbage.  The entire premise upon which this 
"study" and it's conclusions are based is 100% backwards.  Most software 
companies do not publicly report security vulnerabilities until they are fixed 
and that fix is released.  

Also, a great many of the vulnerabilities in Firefox are discovered by Firefox 
developers and community members and patched before anyone on the outside even 
knows about them.  And one path of inquiry into a vulnerability will often lead 
to the discovery of other related possible vulnerabilities which also end up 
fixed.  There's even cases of vulnerabilities created by new code in 
development builds that is fixed long before the code that created the hole 
appears in a release version.  Security contests like PWN-2-OWN make all 
discovered vulnerabilities known to the software developers before results of 
the contest are published, giving firms a chance to fix them... note that IE 
scores on PWN-2-OWN are sometimes redacted for these reasons.  

So instead of high numbers of published vulnerabilities representing "unsecure" 
software, it generally represents the exact opposite... active and aggressive 
security testing and fixing.

So what's the least secure setup?  Anything that hasn't been updated.  
Especially if it's Windows running IE and Java. 


_______________________________________________
support-seamonkey mailing list
support-seamonkey@lists.mozilla.org
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to