rootkits exist for everything.
when I do infosec audits, I test for an average of about 6000 vulnerabilities over 23 different platforms including AS/400s, Cisco IOS, SUN Solaris, etc etc etc etc
microsoft is targeted so often and so hard because Microsoft considers security to be a "marketing and public relations" problem.... not an architectural and operations consideration.
the minute product liability laws apply to software, microsoft [along with ALOT of other software companies] will face massive class action lawsuits for selling dysfunctional, buggy, flaky unreliable systems. [nobody is innocent of THAT]
it takes a while for legislative structures to catch up with technology.
and frankly, a computer is just a tool. [that runs the power grid, the subway trains, the oil infrastructure, the cooling system for the nuclear reactors, .... you get the picture, sometimes theres a modest public safety impact...]
and sasha is right, no system is totally secure. [a bribe can go a long way] hell, some systems should NOT be connected to networks at all. [stand alone finance systems are common for this reason]
just because the PC/MAC/Sun Workstation etc. came with a network adapter, doesnt automatically mean you have to plug something into it]
the most secure document handlling system I have ever seen, consisted of a Pentium 233 clone box, running dos, and word perfect 6.0 and was kept in a locked office and had a power on password that the guy changed every few days.
this guy is a lawyer client of mine. he never plugs anything into a network without thinking about what the risks and benefits are.
Threat Risk Assessment is a formalised practice.
Amateurs hack systems. Professionals hack PEOPLE.