ZDNet independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission.Our process
'ZDNet Recommends': What exactly does it mean?
ZDNet's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.
When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNet nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.
ZDNet's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.
In fact, the number of vulnerabilities in Apple's products is rapidly catching up with companies like Google and Microsoft.
A report by Atlas VPN (based on data from Telefonica Tech Cybersecurity) shows how vulnerabilities found in Apple products surged by 467% during the second half of 2021 to 380 exploits, a dramatic rise from the 67 uncovered during the first half of 2021.
In fact, this puts the number of vulnerabilities found in Apple products in the latter six months of 2021 a stone's throw away from the top generators of vulnerabilities -- Google (511 vulnerabilities) and Microsoft (428 vulnerabilities).
According to the report, a good chunk of Apple's vulnerabilities seems to relate to the Safari web browser and its various operating systems, while the majority of Microsoft's vulnerabilities are associated with Windows OS versions, Office tools, and the Microsoft Edge browser, while Google's vulnerabilities are mostly focused around the Android operating system and the Chrome browser.
So, what does this mean for Apple users?
First, let go of the perilous myth that your Apple gadgets are immune to hacking and malware.
Do it quickly, and check for any updates you might have missed often.
Finally, be aware of when your Apple products stop being supported by security updates. Once this point is reached, your devices can start to collect vulnerabilities at a rapid pace. As painful as it is, having an eye on replacing obsolete devices is essential to securing your digital information.