Google and Apple, both owners have seen cybercriminals are loopholes in their systems.
In late September, the company manufactures iPhones had to recognize that a group of Chinese hackers perpetrated the greatest attack on IOS in its history, with viruses infecting at least 60 applications from its App Store.
And a few months before, came to light the greatest security flaw detected in Android, which affected a 95% of users. It was a vulnerability, discovered by security firm Zimperium, which would have allowed a hacker to enter the phone without the user doing anything or any app can be downloaded.
So, which one is safer?
The answer is emphatic. Both have advantages and disadvantages, as shown in a recent comparative report by the security company and antivirus Panda Security.
To find out which is the safest for you will depend on the type you use it to your phone.
Advantages and disadvantages of iOS
The iOS system has the advantage that a closed system safer, in principle because “Apple has a special control over the work of application developers,” explains Panda experts.
The App Store has different mechanisms to verify the apps tools and origin. Although this, as we have seen, does not make you invulnerable.
It also has the advantage that the data stored in the notes, reminders, contacts and calendar “have an extra layer of encryption “.
However, the report ” scraping approved “to privacy issues.
There are warning that on many occasions have revealed the existence of vulnerabilities, “back doors” in their devices and attacks on ID accounts.
Advantages and disadvantages of Android
Android has always been in the spotlight of cybercriminals because it has many more users than iOS, and therefore are more likely to succeed in their attacks.
However, Panda Security ensures that developers Android use the “more complex than those that emerged later and, therefore, more difficult to change by the criminals” language programming C ++.
Your main problem is in the Play Store, the app store. The level of demand to avoid tools of unknown origin is less and the operating system does not give the slightest sign of uncertainty.
The code their apps, in Java, it is easily modifiable by criminals, the report said.
But if to purchase applications is less secure than your opponent, the operating system displays great strength when it comes to make secure payments through the cell, they say.
The key is the use of EHR technology (host card emulation).
Works through an app offered by banks and is discharged into the cell.
When you make a payment, the tool sends user information “through secure standards” installed in the NFC chips the device.
It seems, then, that it is impossible to be 100% sure when you use the phone and internet.
In this regard, the report says despite the strengths and weaknesses of the systems, it is very important that you use strong passwords, you change them often and use caution with the downloads.
No comments:
Post a Comment