Exploitation of just ONE software vulnerability is typically all that separates the bad guys from compromising an entire machine. The more complicated the code, the larger the attack surface, and the popularity of the product increases the likelihood of that outcome. Operating systems, document readers, Web browsers and their plug-ins are on today
Visit a single infected Web page, open a malicious PDF or Word document, and bang

The link for this article located at ZDNet Blogs is no longer available.