Experts challenge mi2g security study: mi2g response
    
   
  London, UK - 6 November 2004, 14:15 GMT
    
    For the Attention Of:
    
    Matthew McKenzie
    Editor, Linux Pipeline
    
    Scot Finnie
    Editor-at-Large, Linux Pipeline;
    Editor, Pipelines and TechWeb
  
    Dear Sirs
    
    This is an Open Letter published on our websites with immediate effect 
    (www.mi2g.net and www.mi2g.com). 
    
    We write to you from mi2g in London, England and would be pleased if 
    you can investigate the situation we are facing as a result of your group's 
    recent publication. Your readers have repeatedly brought the following to 
    our attention and we are concerned to read the article which has been authored 
    by your colleague:
    
    Experts challenge mi2g security study - http://www.linuxpipeline.com/news/52200183 
    
    
    Linux experts slam a report naming the OS as a favourite hacker target, 
    citing methodology flaws and "suspicious" conclusions.
  The same story has already appeared on Internet Week - http://www.internetweek.com/breakingNews/showArticle.jhtml?articleID=52200309
    
    The article appears to be responding to the following news alert issued by 
    mi2g:
    
    Deep study: The world's safest computing environment - http://www.mi2g.net/cgi/mi2g/press/021104.php
    
    With respect, we are concerned that we have not been asked to make a comment 
    at all in regard to the published article, which amounts to firing a gun, 
    that discredits us and challenges our reputation, on the shoulder of eminent 
    personalities. Those personalities also appear not to have read the mi2g 
    news alert or the underlying report for that matter and have made factually 
    incorrect statements as a result.
    
    For the record, we are supporters of Linux and run www.mi2g.net on Linux. 
    The mi2g Security Intelligence Products and Systems (SIPS) Engine runs 
    on Linux, Apache, MySQL and PHP (LAMP) architecture. We believe that good 
    administration is central to working with Linux. Those skills are lacking 
    in the global market and are the root cause behind Linux receiving a much 
    higher number of manual hacker breaches. Manual breaches can be much more 
    complex and sophisticated than automated ones proliferated through malware.
  
   Neither mi2g Ltd nor the mi2g Intelligence Unit have a business 
    relationship with Apple Computers or Microsoft Corporation and we do not own 
    any shares, options or derivatives in those corporations at present. Previously, 
    the mi2g data for one month was considered to be too small a sample 
    and not representative of the global environment within which different types 
    of entities - micro, small, medium and large - exist. We have addressed those 
    concerns in the new study. The critics were against the previous study which 
    also came out in favour of Apple and BSD, because the entrenched supporters 
    of Linux and Windows felt that mi2g was guilty of 'computing blasphemy'. 
    In subsequent months, mi2g's reputation was damaged on search engines 
    and bulletin boards. We would urge caution when reading negative commentary 
    against mi2g, which may have been clandestinely funded, aided or abetted 
    by a vendor or a special interest group. 
  Please read the following articles:
    
    Disturbing the sanctity of the Linux church - http://www.mi2g.net/cgi/mi2g/press/020304_2.php
    
    Please visit www.mi2g.net, we have just done a news alert to answer a raft 
    of questions raised in your apparently ill-informed and ill-judged article:
    
    The relativistic approach to safety - uptime versus market share - http://www.mi2g.net/cgi/mi2g/press/051104.php
    
    The above article deals with other aspects of the recent study based on all 
    the feedback we have received.
    
    Please have a look at http://www.mi2g.net/cgi/mi2g/sips.php 
    & http://www.mi2g.net/cgi/mi2g/sipsgraph.php 
    to read more about how the reports are generated and their components. To 
    read the SIPS FAQ please visit http://www.mi2g.net/cgi/mi2g/press/faq.pdf
    
    If you feel that we have merit in what we have said and your readers ought 
    to know about it, we would urge you to publish this feedback in its entirety 
    on your website and also on all the syndicated websites that have published 
    your article, because this is a very serious matter and we are not prepared 
    to accept blindly directed misfired criticism.
    
    Best wishes and we remain, Sirs
    
    Yours sincerely 
  
    
  mi2g Intelligence Unit
    
    [ENDS]
  Related Articles:
  17th November 2004 - Full compendium 
    of mi2g speeches released on web
    12th November 2004 - Exclusive interview of DK Matai 
    with Linux/Security Pipeline
    12th November 2004 - Deep study: The ongoing Linux Attacks 
    fallout
    5th November 2004 - The relativistic approach to safety 
    - uptime versus market share
    2nd November 2004 - Deep study: The world's safest computing 
    environment
    24th March 2004 - Five solutions to the rising identity 
    theft and malware problem
    2nd March 2004 - Disturbing the sanctity of the Linux 
    Church
     19th February 2004 - The World's safest Operating 
    System
  
  Coverage:
    
    Information 
    Security News: mi2g defends its Linux claims - Insecure.org
    mi2g 
    defends its Linux claims - Virus.org
    mi2g defends 
    its Linux claims - The Inquirer
    Interviews: 
    DK Matai with Linux/Security Pipeline - Linuxtimes.net
    Exclusive 
    interview of DK Matai with Linux/Security Pipeline - LinuxSecurity.com
    Exclusive 
    interview of DK Matai with Linux/Security Pipeline - eBCVG IT Security
    Apple's 
    Mac OS X is much more secure than Linux or Windows - MacDailyNews
    Furore 
    over OS security survey - ITWeb
    Sloppy 
    Sysadmins Leave Linux Security Lacking - InternetWeek.com
    Sloppy 
    Sysadmins Leave Linux Security Lacking - CRN
    Sloppy 
    Admins Leave Linux Vulnerable To Security Breaches - Information Week
    Linux 
    is 'most breached' OS on the Net, security research firm says - ARNnet
    Linux 
    is 'most breached' OS on the Net, security research firm says - LinuxWorld
    Linux 
    is 'most breached' OS on the Net, security research firm says - ComputerWorld
    Security 
    company defends Linux-is-vulnerable survey - HNS
    The 
    worlds safest computing environment - TechCentral
    mi2g response: 
    Experts challenge mi2g security study - eBCVG IT Security
    PC 
    Pro: Security Company Defends Linux-is-Vulnerable Survey - linux today
    Study: 
    Linux Is Least Secure OS - WindowsITPro
    Linux 
    Most Breached OS, Says New Report - CXO Today
    Survey: 
    Mac OS X most secure, Linux least - ITWeb
    Mac 
    OS X, BSD Unix top security survey - Neowin.net
    Mac 
    OS X, BSD Unix top security survey - Computer World
    Study: 
    OS X World's Safest OS From Security Attacks - MacNewsWorld
    Study 
    Recommends Mac OS X as Safest OS - Slashdot
    Mac 
    OS X, BSD Unix top security survey - MacCentral
    Security: 
    Mac OS X Good, Linux Bad - eBCVG IT Security
    Study: 
    Apple's Mac OS X 'world's safest and most secure' operating system - MacDailyNews
    Study: 
    OS X World's Safest OS From Security Attacks - the Mac Observer
    The world's 
    safest computing environment - eBCVG IT Security
    Mac 
    OS X - 'world's safest' - Macworld Daily News
    The 
    world's safest computing environment - TechCentral
  
  
  mi2g is at the leading edge of building secure on-line banking, broking 
  and trading architectures. The principal applications of our technology are:
  
  1. 
D2-Banking; 
  2. 
Digital Risk Management; and 
  3. 
Bespoke Security Architecture.
  
  
mi2g pioneers enterprise-wide security practices and technology to save 
  time and cut cost. We enhance comparative advantage within financial services 
  and government agencies. Our real time intelligence is deployed worldwide for 
  contingency capability, executive decision making and strategic threat assessment.
  
  
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
  is available from 
here in pdf. Please 
  note 
terms and conditions of use listed on 
www.mi2g.net
  Full details of the October 2004 report are available as of 1st November 
    2004 and can be ordered from here. 
    (To view contents sample please click here).