Wednesday, October 14, 2015

Android or iOS: What mobile operating system is more secure? – BBC

The two systems, iOS and Android, have strengths and landmarks & # XE9; Biles Depending on the use you give to the cell, will be & # XE1;. m & # XE1;. s sure one or the other Image copyright THINSTOCK
Image caption The two systems, iOS and Android, have strengths and weaknesses. Depending on the use you give to the phone, you will be more secure one or the other.

Android or iOS? That is the question that users of the two most popular operating systems for mobile phones will be made after that, in recent months, the security of both were significantly been compromised.

Google and Apple, proprietary both have seen cybercriminals are loopholes in their systems

See also:. The malicious app pornography extorts users of Android

In late September The company that makes iPhones had to recognize that a group of Chinese hackers perpetrated the greatest attack on IOS in its history, with viruses infecting at least 60 applications from its App Store.

Image copyright Thinkstock
Image caption You should use strong passwords and change them constantly, it is impossible to achieve 100% security on the Internet.

And a few months before, came to light the greatest security flaw detected in Android, which affected 95% of its users. A vulnerability was discovered by security firm Zimperium, which would have allowed a hacker enter the phone without the user doing anything or any app can be downloaded

See also:. They discover a of the worst vulnerabilities affecting millions Android phone

So, which one is safer?

The answer is emphatic. Both have advantages and disadvantages, as shown in a recent comparative report by the security and antivirus company Panda Security

See also:. The “new era” of malware attacking Apple products

To find out which is the safest for you depends on the type of use that you give the phone.

Advantages and disadvantages of iOS

The iOS system has the advantage that a closed system, safer in principle, since “Apple has a special control over the work of application developers,” explained the Panda experts.

Image copyright Getty
Image caption Usually iOS apps are safer, though its App Store has just suffered the biggest attack of its history.

The App Store has different mechanisms to verify the apps tools and origin. Although this, as we have seen, does not make you invulnerable.

It also has the advantage that the data stored in the notes, reminders, contacts and calendar “have an extra layer of encryption “.

However, the report ” scraping approved “to privacy issues.

There are warning that on many occasions have revealed the existence of vulnerabilities, “back doors” in their devices and attacks on ID accounts.

Advantages and disadvantages of Android

Android has always been in the spotlight of cybercriminals because it has many more users than iOS, and therefore are more likely to succeed in their attacks.

However, Panda Security ensures that developers Android use the “more complex than those that emerged later and, therefore, more difficult to change by the criminals” language programming C ++.

Image copyright Getty
Image caption Android Developers They have managed to make it safe to make payments with their mobile phones.

Your main problem is in the Play Store, the app store. The level of demand to avoid tools of unknown origin is less and the operating system does not give the slightest sign of uncertainty.

The code their apps, in Java, it is easily modifiable by criminals, the report said.

But if to acquire applications is less secure than your opponent, the operating system shows great strength when making secure payments through the cell, they say.

The key is to use EHR technology (host card emulation).

It works through an app offered by banks and is downloaded to the phone.

When you make a payment, the tool sends the user information “through secure standards” installed in the NFC chip device.

It seems, then, that it is impossible to be 100% sure when you use the phone and internet.

In this regard, the report argues that despite the strengths and weaknesses of the systems, it is very important that you use strong passwords, you change them often and use caution with the downloads.

LikeTweet

No comments:

Post a Comment