Microsoft Fixes
As a Linux user I actually applaud Microsoft for releasing more fixes - but the persistent architectural flaws within Windows are causing many of these problems.
Ironically it is one of the reasons for the success of Windows that causes many of the problems - binary compatibility with programs dating all the way back to the days of MS-DOS. In order to support all of the 20+ years of applications, Windows must support all of the quirks and flaws in the architecture (and security models) of earlier versions of Windows in order to guarantee that earlier applications will run correctly on the latest version of x86 Windows. The most secure (and efficient) copy of Windows is undoubtedly the latest Windows 8 RT (ARM tablet version) that is NOT binary compatible with any earlier versions of Windows!
Open source systems (like Linux and FreeBSD) in which the SOURCE CODE is available for applications do not have to worry about compatibility between major releases of the operating system (or kernel) since the application is just recompiled (by the Linux distributor) against the new system library code. That means that earlier binary code almost certainly will NOT run on later versions of the operating system but ironically this also means that historical attacks on earlier Linux/FreeBSD BINARIES will probably not work on a later versions of the operating system as these have been recompiled (and in many cases changed). It also means that architectural flaws can be fixed (which break binary compatibility) - something that proprietary software vendors (like Microsoft and Apple) cannot do as they do not have access to the application source code.
Virus scanners give the ILLUSION of security as they use a black list of N known threats. As soon as (N + 1) appears then you are open to attack. It also means that as time goes on, the system gets slower and slower as it has to check against more and more threats, The proper way to deal with flaws (and all operating systems have them) is to FIX them as soon as they are known (as Microsoft is doing here and should be applauded for doing) - not trying to detect bad code at the last possible instant using a virus scanner!
In addition, Unix/Linux style operating systems (like Apple OS/X, Linux and FreeBSD) work on a 'sandboxed' security model in which a standard user has the least possible file privileges (i.e. can only modify their own files and NONE of the system files - to modify the system requires using admin (root) privileges for the shortest possible time). As a second safeguard, having additional restrictions as to what known applications can do - even with root privileges (as provided by AppArmor and SELinux) helps to prevent using these applications as an attack vector. As a third safeguard, having a standard (restricted) method of installing applications from known (and GPG key checked sources) - such as APT or YUM - reduces the likelyhood of introducing rogue applications - as does centralized App stores.
UEFI and 'trusted computing' does not make the system more secure (and there are UEFI viruses now) - just lock out competition which is what they are for.
Microsoft should ditch direct backwards compatibility but do as Apple did (with the move from OS/9 to OS/X) by having an emulator to run Windows 7 (and earlier) applications in a protected 'sandbox'. Only by breaking with the past can they fix long standing architectural flaws and remove the need for virus scanners forever.