{"id":53291,"date":"2013-10-21T16:59:16","date_gmt":"2013-10-21T14:59:16","guid":{"rendered":"http:\/\/onsoftware.en.softonic.com\/?p=53291"},"modified":"2025-07-02T01:05:07","modified_gmt":"2025-07-02T08:05:07","slug":"security-showdown-ios-7-vs-android-4-3","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/security-showdown-ios-7-vs-android-4-3\/","title":{"rendered":"Security showdown: iOS 7 vs. Android 4.3"},"content":{"rendered":"<p>In the battle for mobile supremacy, there are two main contenders<strong>:<\/strong> iOS and Android. They&#8217;re the most popular, but which is the most secure?<\/p>\n<h3>Mobile security &#8211; often ignored<\/h3>\n<p>According to a <a href=\"http:\/\/blogs-images.forbes.com\/markfidelman\/files\/2012\/05\/image1.png\"> survey from Motorola<\/a>, only 12% of buyers take security\u00a0into account when they&#8217;re buying a phone. People prefer to look at things like applications availability, usability and superficial aspects such as the style of the icons or the fluidity of the animations.<\/p>\n<p>We forget that a phone is no longer just a device to make calls: we use them to store emails, passwords, pictures and more. Smartphones effectively store the most important details of our lives &#8211;\u00a0 and not just our personal lives. We connect to corporate networks, read confidential documents and fill out job applications &#8211; all on our smartphones.<\/p>\n<p>What&#8217;s worse, we use our phones while ignoring the most basic security principles. Between <a href=\"http:\/\/blog.trendmicro.com\/mobile-privacy-tip-1-use-a-security-code-to-lock-your-phone\/\">30 and 60% of people<\/a> don&#8217;t use locking systems, like PINs or an unlock pattern, on their\u00a0phone. More complex and powerful options such as data encryption are almost universally ignored.<\/p>\n<p>The <a href=\"http:\/\/features.en.softonic.com\/nsa-scandal-how-closely-is-big-brother-watching-us\">NSA scandal<\/a> has put data privacy in the spotlight, and has urged software authors and phone manufacturers to put more emphasis on security in each update.<\/p>\n<h3>Android 4.3 vs. iOS 7<\/h3>\n<p>iOS and Android are the quintessential high-quality devices and they contain a lot of personal data. In each of their most recent updates, both Apple (iOS) and Google (Android) strive to improve system security through new security options, patching vulnerabilities and installing system improvements.<\/p>\n<p>But sometimes things go wrong, as happened in the case of iOS 7, users discovered that calls\u00a0could be made from the lock screen. This sort of slip-ups\u00a0show the complexity inherent in ensuring mobile security and the balancing act of\u00a0combining\u00a0security and speed of use: you want to protect data, but not at the expense of usability.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/calls-568x319.jpg\" alt=\"\" \/><\/p>\n<p>If we were to ask Google and Apple, they would each\u00a0say that their system is the most secure. And that&#8217;s exactly what&#8217;s happening. Eric Schmidt, CEO of Google,<a href=\"http:\/\/www.zdnet.com\/googles-schmidt-android-more-secure-than-iphone-7000021670\/\"> says <\/a>that &#8220;Android is more secure.&#8221; On the other hand, Tim Cook, Apple&#8217;s CEO, <a href=\"http:\/\/slashdot.org\/topic\/cloud\/apple-ceo-tim-cook-has-some-choice-words-about-android\/\"> emphasized<\/a> the negative consequences of <a href=\"http:\/\/features.en.softonic.com\/what-is-google-play-services\" target=\"_blank\" rel=\"noopener noreferrer\">Android fragmentation<\/a>, which carries with it the need to plug holes. Putting aside opinions and advertising, though, which of these platforms is safer for users? In this comparison, <strong>we put both systems, iOS 7.0.2 and Android 4.3, to the test.<\/strong><\/p>\n<h3>The 5 levels of mobile security<\/h3>\n<p>We&#8217;ve come up with <strong>five levels of progressively more complex security<\/strong> which encompass safety issues ranging from the basics, such as the lock screen, to the more advanced, such as encryption or the number of vulnerabilities.<\/p>\n<p>For the vast majority of users, Level 1 is the only one they know about\u00a0and the only thing that matters, while level 5 is only of interest to more advanced users. There are aspects of levels 2-4 that may be of interest to all users, but they generally don&#8217;t spring to attention in normal daily use.<\/p>\n<h4><strong>Level 1: Locking or identification systems<\/strong><\/h4>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/level1.jpg\" alt=\"\" \/><\/p>\n<p><strong>Accessing\u00a0your phone or tablet<\/strong> is the basic level of security that concerns all users, regardless of what device they use. Without this level, a device is at the mercy of any opportunistic (or malicious)\u00a0person.<\/p>\n<p>Android 4.3 has five screen lock systems: swipe, Face Unlock, Pattern, PIN and password. They&#8217;re configured from the menu Security\u00a0&gt; Lock. Meanwhile, iOS provides only two methods: swipe\u00a0and PIN code.<\/p>\n<p>Swipe offers no security, and it&#8217;s only there\u00a0to prevent accidental inputs. PIN is a numeric code that, if kept to\u00a0the minimum (four digits), can be guessed in <a href=\"http:\/\/security.stackexchange.com\/questions\/35895\/how-secure-are-iphone-android-windows-8-pin-pattern-lock-features\">less than a day<\/a>. While iOS put delays in\u00a0between incorrect attempts, <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2013\/09\/3d-printed_robo.html\">Android does not<\/a>. Moreover, in iOS there is an additional option to erase all data after ten failed attempts.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/slide-568x426.jpg\" alt=\"\" \/><\/p>\n<p>When it comes to the other locking systems offered by Android, facial recognition is the one that even\u00a0Google <a href=\"https:\/\/support.google.com\/nexus\/answer\/2819522?hl=en&amp;ref_topic=3048853\">says<\/a> is the least secure, since it can easily be\u00a0fooled <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2396321,00.asp\">by a photo<\/a>. The system of patterns (drawing lines between points) is easy to remember and fairly robust, but depends on the complexity of the pattern, and fingerprints on the screen can be clues that undermine reliability.<\/p>\n<p>The safest option is an alphanumeric password, but it is also the most inconvenient to use, and is most effort to set up well (people generally don&#8217;t\u00a0like having to remember complex passwords). iOS 7 running on new devices, offers <a href=\"http:\/\/support.apple.com\/kb\/HT5883\">Touch ID<\/a>, a fingerprint recognition\u00a0system which is very easy to use and <a href=\"http:\/\/www.macworld.com\/article\/2048520\/fingerprint-sensor-in-iphone-5s-is-no-silver-bullet-researchers-say.html\">more robust<\/a> than almost all alternatives.<\/p>\n<h4>Convenience vs. security<\/h4>\n<p>So which device offers the safest access systems? If we go on sheer number of options offered, it&#8217;s got to be Android, but when you consider the convenience factor and Apple&#8217;s new Touch ID, things change. Convenience vs. safety is the most heated debate as far as mobile security is concerned. We&#8217;ve prepared this graph to help you get your head around it:<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/09-10-2013-12-19-06.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: center\"><em>Subjective ratings of safety and convenience. Asterisks indicate that the security depends on the complexity of the password or pattern. Those in green have both.<\/em><\/p>\n<p>The two\u00a0locking systems that are <strong>secure AND easy to use<\/strong> are the patterns (Android) and fingerprint (iOS). PINs score low on the security front if they&#8217;re left at four digits, which is standard.\u00a0Passwords can be very safe, but convenience goes down dramatically as their complexity increases. The battle, then, is between the Android pattern system and Touch ID from iOS.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/touchid.png\" alt=\"\" \/><em>Touch ID from\u00a0Apple in action (photo courtesy of\u00a0<a href=\"http:\/\/www.iphoneworld.com.es\/2013\/09\/el-touch-id-del-iphone-5s-es-realmente.html\" target=\"_blank\" rel=\"noopener noreferrer\">iPhoneWorld<\/a><\/em>)<\/p>\n<p>Android offers more locking options, they can be extended through third party apps and the pattern system is fairly easy to use, but it&#8217;s more vulnerable and less convenient than iOS 7&#8217;s\u00a0Touch ID fingerprint reader.<\/p>\n<p style=\"text-align: left\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/ioswins.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: left\">iOS 7 wins for balance between convenience and security (thanks to Touch-ID), and its approach seems to be\u00a0the best for simplicity and ease of use.<\/p>\n<h4><strong>Level 2: application security<\/strong><\/h4>\n<p style=\"text-align: center\"><strong><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/level2.jpg\" alt=\"\" \/><\/strong><\/p>\n<p>After analyzing the access options, we turn our\u00a0attention to applications: how to obtain, install, authorize and execute them. Users install dozens of apps on their devices, but don&#8217;t typically pay much attention to safety. So what do iOS and Android do to ensure that malicious applications won&#8217;t\u00a0cause a disaster?<\/p>\n<p>At first glance, both Android and iOS adopt a similar approach, in the sense that they both rely on applications in their own markets which check (automatically\u00a0and manually) the safety of the thousands of applications available to the user. Both systems isolate the processes in a sandbox, which prevents an application taking\u00a0control of the entire system, and they do this very effectively.<\/p>\n<h4>Open model vs. closed<\/h4>\n<p style=\"text-align: left\"><strong>The safety of both ecosystems and markets is very good<\/strong>, although there have been cases of malicious applications that have managed to sneak past. For example, researchers at Georgia Tech managed to introduce the <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity13\/jekyll-ios-when-benign-apps-become-evil\">Jekyll application<\/a> on the iOS Store. But malware can also sneak into Android, and it&#8217;s already happened on several occasions.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/fakeappsandroid-568x280.png\" alt=\"\" \/><em>Fake apps in Google Play, a common sight\u00a0(<a href=\"http:\/\/9to5mac.com\/2012\/11\/17\/not-real-apple-apps-from-apple-inc-end-up-on-google-play-market-for-android\/\" target=\"_blank\" rel=\"noopener noreferrer\">s<\/a><a href=\"http:\/\/9to5mac.com\/2012\/11\/17\/not-real-apple-apps-from-apple-inc-end-up-on-google-play-market-for-android\/\">ource<\/a>)<\/em><\/p>\n<p>Both of these cases were exceptional situations, but while sources estimate that about <a href=\"http:\/\/www.stableytimes.com\/news\/lookout-six-percent-of-android-apps-in-google-play-store-are-malware\/\">6% of apps on Google Play are malware<\/a>, for the iTunes Store this figure is\u00a0virtually nil (partly because Apple doesn&#8217;t\u00a0provide data). Android, which has a 70% market share, has become the\u00a0favorite target for hackers, <a href=\"http:\/\/appleinsider.com\/articles\/13\/06\/26\/android-accounts-for-92-of-mobile-malware-malicious-apps-increase-614\">92% of mobile malware<\/a> can be found there. Does that mean that Android is less secure?<\/p>\n<p>Assuming normal use and that applications are obtained only from Play or Amazon, malware risk is as low as that of iOS. But whereas iOS forces users to install only applications sourced from its store, <strong>Android has adopted a much more liberal approach<\/strong>, leaving the door open for\u00a0installing completely independent applications and even separate stores. And through this door, malware can enter.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/unknownsources.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: center\"><em>Android allows the installation of applications from unknown sources<\/em><\/p>\n<p>Being a more open system, Android favors the installation of third party apps. It&#8217;s dangerous, but it gives you immense flexibility that iOS users can only dream of &#8211; or try to emulate by jailbreaking their devices. This freedom, however, comes at a price, and this price is the possibility of accidentally installing malware disguised as legitimate apps. Incidentally, the risk of malware has led to a flourishing industry of <a href=\"http:\/\/en.softonic.com\/android\/security\" target=\"_blank\" rel=\"noopener noreferrer\">antiviruses for Android<\/a>.<\/p>\n<h4>Managing app permissions<\/h4>\n<p>One way to control what applications make it through is via a permit system, which establishes what data and which parts of the device a particular application can access. Both Android and iOS have permit systems, but their style of informing the user <a href=\"http:\/\/www.techrepublic.com\/blog\/security\/comparing-android-and-ios-security-how-they-rate\/5774\">differs greatly<\/a>.<\/p>\n<p>iOS just asks the user when necessary to authorize access to a specific resource. The user can then accept or reject each as he wishes, with the app already installed and working. In Android, it reports from the beginning in\u00a0great detail about the permissions required by an app, and the decision is &#8220;all or nothing&#8221;: if the user doesn&#8217;t\u00a0accept the conditions, the application isn&#8217;t installed.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/permisos.png\" alt=\"\" \/><\/p>\n<p>In Android 4.3, detailed permissions were introduced,\u00a0although the feature is hidden: to activate it you have to use apps like <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.schurich.android.tools.appopsstarter&amp;hl=en\">App Ops Starter<\/a>, which make it visible.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/ioswins.png\" alt=\"\" \/><\/p>\n<p>iOS wins for its stricter control of apps, in exchange for giving up the freedom to install any application you want&#8230;<\/p>\n<p><strong>Level 3: Protection of privacy<\/strong><\/p>\n<p style=\"text-align: center\"><strong><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/level3.jpg\" alt=\"\" \/><\/strong><\/p>\n<p>The first two levels cover essential security, but what about more subjective aspects such as privacy? Things like how data is displayed\u00a0on the lock screen or the sending anonymous (or not) data for advertising purposes are hot topics and issues\u00a0that may bother many users.<\/p>\n<h4>Notifications on the lock screen<\/h4>\n<p>Being able to read notifications directly from the lock screen is something that Android, for now, does not allow &#8211; to achieve this you need to install <a href=\"http:\/\/www.maketecheasier.com\/show-notification-in-lockscreen-android\/\">third party applications<\/a>. This can be inconvenient, since you need to unlock the screen every time you want to check what&#8217;s going on on your phone, but Android does support illuminated notifications via LED (on mobile phones that allow it).<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/notif-568x408.png\" alt=\"\" \/><\/p>\n<p>iOS, on the other hand, displays notifications directly on the lock screen, and does so by default. You can read mail or <a href=\"http:\/\/whatsapp.en.softonic.com\/iphone\">WhatsApp<\/a> messages without unlocking the terminal, for example. Notifications of this type can be disabled from the <strong>Notifications Center<\/strong>, which features custom options for each application that uses this feature.<\/p>\n<h4>Personalized Ads<\/h4>\n<p>Both iOS and Android can <strong>send data to customize ads<\/strong>. For some people, this feature, far from being\u00a0helpful, is an unacceptable intrusion into their personal sphere.<\/p>\n<p>With Android, this is controlled from <strong>Google Settings &gt; Ads<\/strong>. In iOS, from the settings\u00a0menu\u00a0<strong>Privacy &gt; Announcements<\/strong> and from the <strong>System Services menu<\/strong> &#8211; in other words, you have to do quite a bit of navigating\u00a0to disable it.<\/p>\n<h4>Browsing privacy<\/h4>\n<p>Most\u00a0of the time we&#8217;re on our devices we&#8217;re browsing the web. The native iOS 7\u00a0and\u00a0Android 4.3\u00a0browsers\u00a0are\u00a0Safari and Chrome, and they each have abundant privacy settings.<\/p>\n<p><strong>Safari<\/strong>, the default browser for iOS 7, has a Do-Not-Track option\u00a0to disable cookies and selective cookie blocking.<\/p>\n<p><strong>Chrome<\/strong>, the Android browser, has a whole menu dedicated to privacy, with Do-Not-Track and options to disable bug reports, suggestions and predictions of network shares.<\/p>\n<p style=\"text-align: left\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/androidwins.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: left\">Android wins for the greater control its privacy options for the\u00a0browser offers, as well as the choice, which in my opinion is correct, not to show notifications on the lock screen, although many Android users look upon this feature\u00a0with envy.<\/p>\n<h4><strong>Level 4: Remote device security<\/strong><\/h4>\n<p style=\"text-align: left\"><strong><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/level4.jpg\" alt=\"\" \/><\/strong>Okay, so your phone is secure\u00a0and well configured. But what if it&#8217;s lost or stolen? You&#8217;ll want to find it, locate it on the map or, at the very least, order the automatic deletion of your data if you give it up for lost.<\/p>\n<p>With the &#8220;<a href=\"http:\/\/support.apple.com\/kb\/HT5668\">Find my iPhone<\/a>&#8221; feature, iOS has been the pioneer of locating lost phones. Upon entering iCloud, users can locate their devices and their status (on or off), play a sound and activate the <a href=\"http:\/\/help.apple.com\/icloud\/#\/mmfc0f0165\">lost mode<\/a>, which displays a message on screen. In extreme cases, you can enable remote wipe.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/findmyiphone.png\" alt=\"\" \/><em>Web interface of Find my iPhone (image courtesy of\u00a0<a href=\"http:\/\/applediario.com\/2009\/11\/25\/usa-la-funcion-find-my-iphone-de-mobileme-para-localizar-tu-iphone\/\">Applediario<\/a>)<\/em><\/p>\n<p>Android introduced something similar with its Device Manager. It supports a wide variety of Android devices, and allows you to locate devices on Google Maps, as well as play a sound, block the terminal or erase data remotely. However, there are no options such as a customizable remote message.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/ioswins.png\" alt=\"\" \/><\/p>\n<p>iOS wins for number of options and data\u00a0supplied through Find my iPhone. The Android Device Manager is more limited.<\/p>\n<h4><strong>Level 5: Advanced security<\/strong><\/h4>\n<p style=\"text-align: center\"><strong><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/level5.jpg\" alt=\"\" \/><\/strong><\/p>\n<p>In the last level of security, we look at the more advanced aspects of iOS and Android, such as the encryption of the file system or the ease of obtaining root privileges. If you&#8217;re a basic user, these points probably won&#8217;t interest you much.<\/p>\n<p>Encrypting user data<\/p>\n<p><a href=\"http:\/\/features.en.softonic.com\/what-is-encryption\" target=\"_blank\" rel=\"noopener noreferrer\">Encryption<\/a> allows you to protect data confidentiality. For example, you can prevent a thief from accessing banking data stored on your phone.<\/p>\n<p><strong>In iOS, encryption is enabled at the factory<\/strong> and carried out via dedicated hardware, which minimizes the performance impact. It is a 256-bit AES encryption which is <a href=\"http:\/\/www.technologyreview.com\/news\/428477\/the-iphone-has-passed-a-key-security-threshold\/\">very secure<\/a> in most situations.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/encrypt.png\" alt=\"\" \/><strong> <\/strong><\/p>\n<p><strong>With Android, encryption is a user choice<\/strong>. As we mentioned above, the variety of Android devices has meant that encryption must be implemented through software, which is much more likely to have an impact on performance.<\/p>\n<h4>Superuser (root and jailbreak)<\/h4>\n<p>In any operating system, superuser permissions are essential for complete control of the system. In mobile, this allows you to install unofficial applications, uninstall factory apps or customize the system.<\/p>\n<p>Android has chosen to be totally transparent in this regard. Their devices can be &#8220;rooted&#8221; without too much effort, but this isn&#8217;t required to install applications outside of Google Play. The risk of rooting is minimal, and it&#8217;s a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Android_rooting\">legal operation and accepted<\/a> by many manufacturers.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/superuser.jpg\" alt=\"\" \/><\/p>\n<p>In iOS, obtaining root privileges is part of the <a href=\"http:\/\/en.wikipedia.org\/wiki\/IOS_jailbreaking\">jailbreaking <\/a>process, an operation that is carried out to obtain the\u00a0freedom to customize. It is legal in many countries, but iOS warns of a large number of <a href=\"http:\/\/allthingsapple.me\/reasons-not-to-jailbreak\/\">dangers and instabilities<\/a>.<\/p>\n<h4>Vulnerabilities and updates<\/h4>\n<p>Vulnerabilities are software bugs that can be exploited by malware or attackers to take control of the system, to damage\u00a0or get information.<\/p>\n<p>According to CVEDetails, the number of vulnerabilities in iOS is much higher than that of Android (regardless of browser vulnerabilities). It can be seen in this chart:<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/vulnerabilities.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: center\"><em>Number of vulnerabilities discovered in\u00a0Android and\u00a0iOS by years (source: CVEDetails)<\/em><\/p>\n<p><a href=\"http:\/\/blog.osvdb.org\/2013\/07\/26\/android-versus-ios-security-not-again\/\">This data doesn&#8217;t tell us much<\/a>: despite the large number of vulnerabilities in iOS, the number of applications that can exploit them are\u00a0minimal due to the tight control Apple exerts over the application market (control is annulled with the jailbreak, which is why Apple is so resistant).<\/p>\n<p>So it&#8217;s not that iOS is\u00a0less secure, but it&#8217;s in no hurry to plug these vulnerabilities. Android,\u00a0on the other hand, is definitely in a hurry. And there are other factors to consider when it comes to vulnerabilities and patching them. By controlling the devices, Apple can patch vulnerabilities immediately through a new update that will hit devices no matter what. This only occurs in the Android Nexus range: other manufacturers release new versions as they see fit, forcing many users to change the ROM on their device. Fortunately, Android is <a href=\"http:\/\/features.en.softonic.com\/what-is-google-play-services\" target=\"_blank\" rel=\"noopener noreferrer\">solving many problems<\/a> by bypassing the manufacturers and going for\u00a0updates through Google Play.<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/2\/2013\/10\/ioswins.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: center\">\n<p>iOS wins this one thanks to its superior control over its devices, which allows it to send updates quickly to all users and encrypt data without much effort.<\/p>\n<h3>Verdict: iOS is the winner, albeit not on the freedom front<\/h3>\n<p>In general, <strong>both Android and iOS operating systems are exceptionally secure<\/strong>. Both are committed to security measures enabled by default and do not overload\u00a0users and developers with requests for decisions. The focus, however, differs on certain points, especially with regard to the control of functions.<\/p>\n<p>Apple says in the <a href=\"http:\/\/www.apple.com\/ipad\/business\/docs\/iOS_Security_Oct12.pdf\">iOS Security Guide<\/a> that its\u00a0security is transparent to the user, but some features such as data encryption can be configured. It&#8217;s a foolproof strategy consistent with its user\u00a0strategy &#8211; simplicity &#8211; and its hardware strategy &#8211; optimized.<\/p>\n<p>Android, on the other hand, offers the user a greater degree of control not only for ideological reasons but also because of the fragmentation of devices: enabling\u00a0encryption, for example, has a <a href=\"http:\/\/www.quora.com\/Android-OS\/Does-encrypting-android-device-slow-down-performance-Am-I-legally-required-to-give-the-password-to-police-or-other-investigation-agencies-if-required\">negative impact on performance<\/a> by running via software which is the opposite of what Apple does by encrypting via\u00a0hardware.<\/p>\n<p><strong>iOS is a safer system for all types of users, in exchange for giving up some freedom\u00a0that some users value<\/strong>, like the ability to move data easily or install unofficial applications. With iOS you give up some\u00a0freedom in exchange for thinking less about security, while with Android, you&#8217;re forced\u00a0to think about what you&#8217;re doing.<\/p>\n<h4>Which do you think is the most secure &#8211;\u00a0Android or iOS ?<\/h4>\n<p><em>Note: The author of this comparison article has a Nexus 4 and an iPad 3<\/em><\/p>\n<p><a href=\"http:\/\/articulos.softonic.com\/comparativa-de-seguridad-ios-7-vs-android-4-3\">Original article<\/a> written by <a href=\"http:\/\/articulos.softonic.com\/editor\/fabrizio-ferri\">Fabrizio Ferri<\/a>, published on <a href=\"http:\/\/www.softonic.com\/\">Softonic ES<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the battle for mobile supremacy, there are two main contenders: iOS and Android. They&#8217;re the most popular, but which is the most secure? Mobile security &#8211; often ignored According to a survey from Motorola, only 12% of buyers take security\u00a0into account when they&#8217;re buying a phone. People prefer to look at things like applications &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/security-showdown-ios-7-vs-android-4-3\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Security showdown: iOS 7 vs. Android 4.3&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2040,"featured_media":53540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[2441],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-53291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/53291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/2040"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=53291"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/53291\/revisions"}],"predecessor-version":[{"id":331956,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/53291\/revisions\/331956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/53540"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=53291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=53291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=53291"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=53291"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=53291"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=53291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}