Suspect Analysis, Suspect Data
How do you tally the application bad boy list and separate the MS apps when judging system vulnerability. Who makes the app it immaterial. It is about the Swiss cheese holes in the system.
Worst and most suspect neither MS Word or MS Outlook are on the list of popular & vulnerable MS apps. MS Outlook is the typhoid Mary of the Internet.
Suggest the report is not only misrepresenting data, it is misinterpreting it's own data. http://www.theregister.co.uk/Design/graphics/icons/comment/fail_32.png