That would be an excellent argument if it were based on reality in any way. Meanwhile, back in the real world, things like this happen: http://www.h-i-r.net/2008/03/mac-os-x-pwned-in-two-minutes-flat.html
Yes, Omedalus, that happened. But Charlie Miller stated it took him, and his staff of two other ex-NSA computer security experts almost two months of concentrated work to find that vulnerabilityand the one he saved for the following year's contestand prepare it so that he COULD execute it in a few seconds. Now show us where that vulnerability ever could be used in the wild. It couldn't and wasn't.
So, does that really count as "falling in two minutes-flat?" I don't think so. It makes great headlines, hype, but two months of preparation hardly equals two minutes-flat, and it has very little to do with the real world security.
Yes, vulnerabilities exist. But vulnerabilities that are not, or cannot be viably exploited, are not dangerous in the wild. The vast majority of vulnerabilities that people point to in OSX are known about only after Apple announces them because they have CLOSED them. Apple gets dinged with a lot of "vulnerabilities" as well because they include all fixes for every piece of UNIX that has upgrades, and also include fixes for third party utilities flaws. Apple sends those out routinely with their OSX security patches and those get included with the OSX vulnerability counts, even if they are not part of the active install.