Deep study: The ongoing Linux Attacks fallout
London, UK - 12 November 2004, 01:20 GMT
Dear Sirs
You will be aware of the firestorm that the recent mi2g deep study
- reporting the very high percentage of Linux breaches worldwide - has inadvertently
created: http://www.securitypipeline.com/news/51202581
and http://www.mi2g.net/cgi/mi2g/press/021104.php
After four days of deliberations and an exclusive interview that our Chairman
- DK Matai - gave Linux Pipeline,
this is the result: http://www.securitypipeline.com/trends/52601025
You will also be aware that Linux Pipeline had published the 'experts' challenge
to our study: http://www.securitypipeline.com/52200236
To which we had immediately responded: http://www.mi2g.net/cgi/mi2g/press/feedback.php
If you have any observations, comments or views in all of this, feel free
to share the same with us. We are happy to provide any further clarification
that you may seek.
Best wishes
mi2g Intelligence
Unit
[ENDS]
Related Articles:
17th November 2004 - Full compendium
of mi2g speeches released on web
12th November 2004 - Exclusive interview of DK Matai
with Linux/Security Pipeline
6th November 2004 - Experts challenge mi2g security
study: mi2g response
5th November 2004 - The relativistic approach to safety
- uptime versus market share
2nd November 2004 - Deep study: The world's safest computing
environment
24th March 2004 - Five solutions to the rising identity
theft and malware problem
2nd March 2004 - Disturbing the sanctity of the Linux
Church
19th February 2004 - The World's safest Operating
System
Coverage:
Information
Security News: mi2g defends its Linux claims - Insecure.org
mi2g
defends its Linux claims - Virus.org
mi2g defends
its Linux claims - The Inquirer
Interviews:
DK Matai with Linux/Security Pipeline - Linuxtimes.net
Exclusive
interview of DK Matai with Linux/Security Pipeline - LinuxSecurity.com
Exclusive
interview of DK Matai with Linux/Security Pipeline - eBCVG IT Security
Apple's
Mac OS X is much more secure than Linux or Windows - MacDailyNews
Furore
over OS security survey - ITWeb
Sloppy
Sysadmins Leave Linux Security Lacking - InternetWeek.com
Sloppy
Sysadmins Leave Linux Security Lacking - CRN
Sloppy
Admins Leave Linux Vulnerable To Security Breaches - Information Week
Linux
is 'most breached' OS on the Net, security research firm says - ARNnet
Linux
is 'most breached' OS on the Net, security research firm says - LinuxWorld
Linux
is 'most breached' OS on the Net, security research firm says - ComputerWorld
Security
company defends Linux-is-vulnerable survey - HNS
The
worlds safest computing environment - TechCentral
mi2g response:
Experts challenge mi2g security study - eBCVG IT Security
PC
Pro: Security Company Defends Linux-is-Vulnerable Survey - linux today
Study:
Linux Is Least Secure OS - WindowsITPro
Linux
Most Breached OS, Says New Report - CXO Today
Survey:
Mac OS X most secure, Linux least - ITWeb
Mac
OS X, BSD Unix top security survey - Neowin.net
Mac
OS X, BSD Unix top security survey - Computer World
Study:
OS X World's Safest OS From Security Attacks - MacNewsWorld
Study
Recommends Mac OS X as Safest OS - Slashdot
Mac
OS X, BSD Unix top security survey - MacCentral
Security:
Mac OS X Good, Linux Bad - eBCVG IT Security
Study:
Apple's Mac OS X 'world's safest and most secure' operating system - MacDailyNews
Study:
OS X World's Safest OS From Security Attacks - the Mac Observer
The world's
safest computing environment - eBCVG IT Security
Mac
OS X - 'world's safest' - Macworld Daily News
The
world's safest computing environment - TechCentral
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of our technology are:
1.
D2-Banking;
2.
Digital Risk Management; and
3.
Bespoke Security Architecture.
mi2g pioneers enterprise-wide security practices and technology to save
time and cut cost. We enhance comparative advantage within financial services
and government agencies. Our real time intelligence is deployed worldwide for
contingency capability, executive decision making and strategic threat assessment.
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List
is available from
here in pdf. Please
note
terms and conditions of use listed on
www.mi2g.net
Full details of the October 2004 report are available as of 1st November
2004 and can be ordered from here.
(To view contents sample please click here).