Why Androids are less secure than iPhones

Evolving mobile computing platforms offer a target-rich environment to hackers and have not fully benefitted from 20 years of experience in securing desktop and laptop computers, according to a recent study by McAfee Labs.

“Mobile devices are not going to be less susceptible to security problems,” concludes the report, Securing Mobile Devices. Even with improved security, the devices are likely to remain attractive targets. “The overall threat of malware might decline, but the damage to mobile devices is likely to be high because smart phones are always connected, they always carry some personal data, and they are even equipped with small cameras, microphones and positioning devices.”

The problems don’t stem from inherent insecurity of the devices or operating systems, said Igor Muttik, the report’s author. Most mobile operating systems are built on Unix and Linux and are reasonably secure.

Related coverage:

The most critical element of mobile security: you

Android app test demonstrates dangers for mobile devices

“We shouldn’t be taking about the security of the device itself,” Muttik said. “What matters is the security of the entire environment in which the device is operating.”

This environment includes the marketplace for third-party applications because these apps have become the principal vector for delivering malware to the end users. Unless an Apple device is “jailbroken” to allow unauthorized apps to run on it, all of its apps must first be vetted. The Android model is more open and less secure.

“Apple’s iOS is currently the biggest rival of Android,” the report says. “Apple so far has done an excellent job of securing its devices; as we write this there were no reported cases of malware for iPhones that have not been jailbroken.”

There are other mobile security features besides the software distribution model. Android applications must be signed, but there is no requirement for signatures to be certified, so many apps are self-signed. Android apps also must declare the permissions that they will be requesting at the time of installation and the users has the opportunity only of accepting or declining the entire app at one time without blocking individual permissions.

Signing and permissions are not issues for end users in the Apple model because the Apple iStore itself is a controlled environment.
The differing approaches have both advantages and disadvantages for vendors. Because of the open app policy, Android is more popular with consumers and developers, as well as with hackers.

According to McAfee, Android, released in 2008, is the fastest growing smart-phone OS, with 33 percent of the market at the end of 2010, compared with 31 percent for Symbian, 16 percent for Apple and 14 percent for Research In Motion’s BlackBerry. Symbian, which has been around longer, accounts for a huge 47 percent of malware now in the wild, followed by Android with 32 percent. Apple is included in the 13 percent “others” category.

But Android is growing quickly in popularity with hackers. In the second quarter of this year, it accounted for 63 percent of new malware, with Symbian at 7 percent. Java ME had 20 percent, and Apple is once again tucked into the “others” that account for a total of just 4 percent.

Muttik said that there are useful solutions on the market to help securely administer mobile devices for use in the enterprise. He said he uses an iPhone for work with security policies and remote-wipe capability administered by McAfee. And “there are some controls in the device itself,” such as the ability to change a personal identification number to a more secure password. “Shoulder surfing reveals 4-digit PINs with amazing ease,” he warned.

Overall all, Muttik is not critical of the rush to functionality that has left mobile devices less security than they could be. Rapidly advancing functionality is necessary to ensure adoption of the technology, he said. “That’s life. All new technologies have security risks. It’s a never-ending spiral, when we invent a new technology, it gets abused.”

He said the answer is to adequately secure and manage those devices that are going to be given access to sensitive resources.


About the Author

William Jackson is a Maryland-based freelance writer.

inside gcn

  • threat detection

    In fighting fraud, the only constant is change

Reader Comments

Tue, Jan 31, 2012 Don

A December 7th commenter stated that, "...from personal experience, not one user I have warned of security holes on their devices has cared. Not one. Even after demonstration. The most common response is 'I don't use my phone for anything important, so what do I care'." Interesting! That supports for the frequently heard assertion that most Android phones are simply used as (at best) feature phones, not smartphones...

Thu, Dec 8, 2011 flacopapa

The reason for Android being "less secure" is clear, McAfee Labs has as vested interest in promoting this misconception. This is more about marketing than Android. Most of the articles publish here on Android security have this fundamental flaw, the person providing the information for the article is biased and the person writing the article lacks the necessary knowledge of security to adjust for the bias.

Wed, Dec 7, 2011

A trojan is not a virus. Anyone who understands security knows this. There are distinct differences on what constitutes each form of malware, their definitions, and which each can do. http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

Wed, Dec 7, 2011

This report is fundamentally flawed. It's generally a good idea to make sure that the pages you link to as references exist, especially if they're from your company. Also, one just do a quick search on theregister.co.uk (or the reliable industry news site of your choice) for 'iphone security' to see exactly how 'secure' iOS is. Many of the assertions made in the article about user behaviour are false as well... from personal experience, not one user I have warned of security holes on their devices has cared. Not one. Even after demonstration. The most common response is 'I don't use my phone for anything important, so what do I care'.

Tue, Dec 6, 2011 Dan

A commenter stated that, "Google does check for malware in the Android Apps market using both automated and manual techniques." And yet, there have been so many instances of Android malware... In any case, I hope you're assertion is incorrect--doing such curation would be contrary to Android's espoused "open" nature.

Show All Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group