Is the Apple system secure? Top hackers tell you this is an illusion.

Source: Internet
Author: User
Tags cve

Is the Apple system secure? Top hackers tell you this is an illusion.

Apple Mobile

654, this figure is the total number of vulnerabilities Apple has harvested in the past year. Apple won the Crown of the 2015-year-old loophole and the second in Microsoft, according to Cvedetails, the latest released data from the security data website, followed by 571 holes in the 11 title.

"Apple topped the 2015 vulnerability list with 654 vulnerabilities"

Science: every loophole in the world has a name that is calibrated by the official CVE editorial office in the industry. The name of each vulnerability begins with CVE, followed by a string of mysteries, to ensure that the vulnerability is unique.

So, in 2015, Apple contributed 654 "CVE" to the world in a year's time. From the statistical data, these vulnerabilities include "denial of Service", "Bypass" "Overflow" "Executable code" and so on various attack "posture".

Any kind of attack can cause Apple's system to appear disordered;

If several kinds of attacks combine, it can realize extracting user information, mastering user's permission and so on.

The famous "Jailbreak" is achieved by a series of delicate loopholes.

Apple the number of loopholes in the year bar chart

Let's take a look at that pure Apple, in 2000, Apple only burst 4 loopholes, and in 2014, Apple's only 288 loopholes, this year actually fell to a more "riddled" than Microsoft. On average, Apple will burst out about 1.8 bugs a day. If you look at the total vulnerability History list, you can find:

Microsoft ranked first in 4,243 vulnerabilities, Apple after 2015 years of catching up has been ranked second in 3,087 vulnerabilities;

However, Microsoft's vulnerability is distributed among 405 products, while Apple's vulnerability is distributed among 105 products, with an average of 29 vulnerabilities per product, far exceeding Microsoft's 10.

The total number of loopholes in each company, on the right is the average of each product

Judging from these real data, if Apple's product is safer than Microsoft's, it seems to be unable to find evidence. Lei Feng Network specifically interviewed the domestic famous Apple security research team's core big coffee, the Daniel said:

From an industry perspective, Apple's security is no higher than Microsoft's, just because fewer users and researchers have been there before. As Apple's users grew sharply and security researchers increased a lot, Apple's vulnerabilities erupted this year.

However, the top of the list of loopholes does not mean that Apple's security is poor. The above-mentioned Daniel analyzes the mysteries:

1. Each company's definition of the vulnerability is different, some companies are reported by researchers 5 vulnerabilities, but it may feel that 3 of the trigger scenario is similar, the merger counts as a loophole; some companies are more generous, you can count 5. And Apple should be a more generous company.

2. Systems such as windows have focused on the past few years, and the loopholes have been dug out many, so the number is more stable. The Apple system was recently fully researched, which caused some of Apple's components to be a bit more vulnerable than the current windows, but these are mainly old legacy issues. Because OSX's history is longer than Windows, the hole now dug up is probably the code that Apple wrote 10 years ago.

3. Previous studies of Apple were not covered in all areas due to fewer people. For example, many people are concerned about browser security, but some people are concerned about Bluetooth drivers.

It seems that the Apple system is just an ordinary system. Although it is beautiful and smooth, it turns out that it is no safer than the other small partners. Fortunately, these 654 vulnerabilities were fixed, leaving us each with 654 fewer threats. So, hopefully security researchers will find more "apple holes" in 2016.

Day and Day PA http://www.riripa.cn

Is the Apple system secure? Top hackers tell you this is an illusion.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.