Study: Android Apps, More Secure Than the iOS Ones
While the general perception of the users is that the applications created for the Apple iOS terminals are more secure than the alternatives for Android, the reality is that none of the two platforms is indeed secure. Moreover, a study shows that the iOS apps are less secure than the Android apps.
Despite Apple’s efforts to check and filter the applications that are published in AppStore – checks that apparently allow less malware apps to make it into Apple’s store – the security risks for the users can be significantly higher than the ones of the Android pass.
According to a study conducted by Appthority, covering 50 popular apps that have equivalent versions both in Google Play and App Store, the iOS apps are demonstrating a behavior that involves more risks for the users. Therefore, the majority of iOS apps (60%) are tracking the user’s location and are sending data about them to the advertising and statistics companies. 54% of the iOS apps are accessing the user’s contacts list, while 14% of them are monitoring user’s calendar notes.
The Android apps are not better when it comes to protecting the user’s privacy. Half of them are sending information about the users to the advertising and statistics companies, while only 42% of the Android apps are tracking user’s location.
A worrying aspect is that no matter what platform they are running on, the applications for mobile devices are not providing enough protection against the sensible that they are managing. None of the iOS applications that made the object of the study are using an encrypting protocol for sending or receiving data. On the other hand only 18% of the tested Android apps are encrypting the sent or received data.
To sum up, while the Android platform is a somewhat safer choice than Apple’s iOS in terms of security and privacy protection, none of the two aforementioned platforms is indeed secure. Apple and Google, the companies that own and develop the two platforms are the ones to blame, because both of them are accomplices in a policy that is favoring the maximization of the profits generated by the users, while relaxing or almost totally ignoring the elementary security rules