Is Software More Vulnerable Today?

>