Android and iOS currently account for 99% of the global smartphone operating system market share, so security issues for both systems are essential. Faced with increasingly frequent vulnerabilities and malware threats, Apple and Google have taken a series of measures to combat rogue software, repair vulnerabilities to ensure user information security.
So now, Android and iOS in the end which is more secure? Let's take a look at some of the data listed by the security company.
Mobile security threats are growing
According to Internet security company Symantec released in April last year, the Internet security report shows that mobile devices by the overall threat compared to 2015 doubled, the number of smartphone attacks by malicious software reached 18.4 million times The According to Symantec statistics, in the past two years, 5% of smart phones are infected with malware.
The data show that from 2014 to 2016, the level of iOS vulnerabilities remained relatively stable. The overall number of Android lineup malware growth in 2010 increased by 105%, the growth rate compared to 201 5 years have slowed, Android Android malware growth rate of 152% in 2015.
2016 smart phone new malware type less, most of which is a variant of the virus. Symantec speculates that attackers are now more interested in modifying the previous malware type rather than developing new threats to achieve the purpose of the attack.
Android fragmentation caused serious security risks
Android system fragmentation serious, the latest version of the Android system only in a small part of the equipment to run, coupled with OEM manufacturers of various custom, making it more vulnerable to attack. Due to the Android system open source features, when it is a security vulnerability, malware threats are often more vulnerable.
"Because Android is an open source system, anyone can see what's going on in the system." Any modification of the developer in the software could lead to new vulnerabilities, said Jack Gold, chief research firm at J. Gold Associates, an industry research firm. "Even if you just modify the appearance of the message application, it may also produce loopholes that you do not know, which is the drawback of open source systems, even if it is difficult to detect," Jack Gold said.
Fortunately, Google has been aware of the seriousness of the problem. In recent years, Google has been increasing control of the Android system, Android architecture to improve the security makes it more and more difficult to be infected with malware. Upcoming Android O may not be as open as the previous version, Google's strict management of the source code makes Android more and more difficult to be broken. In addition, some mobile phone manufacturers are also working to improve the security of the system, the introduction of more security software to protect users from malicious software intrusion.
IOS is not spared
Apple on iOS developers limit a lot, Apple will not open its source code. This means that iOS is more difficult to overcome than Android phones. Jack Gold said: "Because Apple has done a lot of restrictions on the system, Apple engineers will always check. Once the phoneprison BreakLoopholes, they will soon take measures to fix the vulnerability. "
"And because Apple controls both hardware and software, they have the ability to secure a high degree of security for the system," Gold added.
Just, the closed iOS is not absolutely safe. For example, last year a spyware "Pegasus", the software using iOS three "zero-day vulnerability" invasion of the iPhone, access to the device in the message, telephone and e-mail applications. In addition,prison BreakWill also increase the iOS device security risks, because for iOSprison BreakOf the vulnerability is easy to be exploited by malware.
Users need to start from their own
Now the field of mobile phone earth-shaking changes in the pursuit of smart phones in the pursuit of strong performance, but also pay attention to their own information security. Regardless of iOS or Android, they are not absolutely safe system. We use the phone in the process, we should try to avoid open the unknown link, not directly from the browser to download the source unknown applications, often check the system updates, install security applications, so as to effectively ensure the security of mobile phone systems, to avoid vulnerability attacks and malicious software The intrusion.