http://www.huffingtonpost.com/2011/07/18/left-itunes-for-spo...
4) I currently host jailbreakme.com, but comex developed that specific jailbreak. I helped with Corona (5.1 exploit) and run Cydia, Substrate, etc.; I guess thinking about it more, I produced the protection fix for one of comex's JailbreakMe PDF exploits (making me somewhat relevantly related to that project).
Apple does not, in fact, have a good reputation when it comes to malicious code: they are simply sufficiently small players that people don't target them. A lot of people believe otherwise, but as far as I can tell this is because their knowledge of Apple products comes only from Apple's marketing efforts.
In fact, in 2010, reknowned security researcher Charlie Miller (who was winning Pwn2Own every year until he decided to stop attending to protest a rules change) was fuzzing PDF renderers, and found many more exploitable PDF files against Apple's Preview (30-60 failures) than in Adobe's Acrobate (only 3-10).
^ This, combined with first-hand experience with the zero-day PDF exploits from comex (where the second exploit was to the same mechanism as the first, as Apple apparently failed to fix it the first time around) are the reason I install Adobe Acrobat and deactivate Preview on my Mac: at least Adobe manages to fix the bugs that are found.
5) iOS 6 was not released in May. In fact, no iOS version was released concurrent to that reported issue, AFAIK. How is this relevant to the example I dragged up and posted? I specifically went out of my way to find an example that would not fall to simple "but the bandwidth is too much for Apple/Akamai to handle!" arguments, and you didn't even pay attention.