How Android Security Stacks Up

AndroidToday’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security.

What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, and Apple’s App Store has been a key factor in the phone’s success. But apps also make smart phones a target for cyber criminals.

Apple knows that it wouldn’t take more than a few malicious apps to tarnish the iPhone’s reputation. That’s why the App Store is a walled community. The only apps that get listed are those that have been approved by Apple. To get approved, developers must create a developer account and pay an annual fee. A team at Apple evaluates and approves each version of each application that is made available. Apple reportedly turns down roughly 10 percent of applications submitted to the App Store because they would steal personal data, they contain “inappropriate content,” or are designed to help a user break the law.

Google has taken a fundamentally different approach to ensuring the security of smart phones running Android. Like Apple, Android also has a store, called the Android Marketplace, from which users can download applications. But unlike Apple, any application can be uploaded to the Android Marketplace–Google doesn’t evaluate them first. What protects Android users from malicious applications is a security model based on “capabilities.” Continue reading.

Related Posts

3 Problems Cloud Security Certification Can Solve What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers?...
ZShaolin keeps getting better. Now has vim, nmap, git, rsync, and ssh Remember ZShaolin? Yep, it's that Android ninja tool that gives you zsh and a whole bunch of command-line applications on your Android device, minus t...
Android 5.0 Lollipop, Nexus 9 tablet and Nexus 6 phablet Android 5.0, code-named Lollipop, is the latest edition of the most popular mobile operating system on planet Earth. Along with it, Google's also rele...
SlateBook x2: Tegra 4-powered Android hybrid The Tegra 4-powered SlateBook x2 running Android Jelly Bean (4.2.2) is the latest split-personality portable computer from HP. Detailed hardware s...
Software sniffs out criminals by the shape of their nose Forget iris and fingerprint scans -- scanning noses could be a quicker and easier way to verify a person's identity, according to scientists at the Un...
Improved Online Security for a Tenth of the Cost Computer scientists at the University of Hertfordshire have found a way to share information online securely for a fraction of the cost of existing sy...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*