IOS 13 vs. Android 10: Which one is more secure?

IOSvs.Android

Apple’s iOS has maintained a dominant security track record, but Google’s Android may just be catching up.

The rise in cybercrime and identity theft has seen Android’s new operating system incorporate an amount of security-conscious measures, including granular application access controls and additional security improvement permissions. In both Android 10 and iOS 13 updates, we can get a clearer view of where Android is going and how they could equate it to iOS ‘s tough steps. Here’s a comparison of the main features of the two operating systems.

Security updates

When it comes to implementing security updates, Apple is known for its automation, making it easy to upgrade both quickly and efficiently in the background. Apple can fine-tune its update methods because it has the ultimate control over the manufacturing chain and coding. Of course, many claims that this will improve protection to the detriment of customization options. Nevertheless, Apple ensures malware and dangerous applications are kept in check.

Owing to its manual updating processes, Android was also more vulnerable. Nonetheless, in May, Google announced that Android security updates would eventually be automatic. Previously, Android provided updates regularly, but the owner had to apply them manually and reset their computer. Android, however, has additional issues with the number of customized versions of its operating system and carrier networks receiving sporadic updates, and the number of reported malware on the Google Store. Right now, Apple has the edge, but it’s clear the Android changes.

Geotracking

Geotraking allows you to determine your location from data, often through shared photos on social media. There are additional location blocking capabilities in the two new operating systems. In particular, Apple has provided users the option of deleting data from photos, which means that a photograph no longer leaves a trail of data showing where and when it was taken. This feature must be selected manually under the Photos options tab.

Similarly, Android’s Photos app already has location stripping. Android is making more conditional leaps here as well, with Android 10 providing fine-tuned geolocation control by refusing permission for secure device access, allowing maximum access, or allowing access only when the application is open.

Permissions

Once you download the app, you always ask for permission before you use it. This includes everything from connections to GPS phone contacts. It can seem to be problematic if such data has been misused, stolen, or sold.

Apple tackles permissions with its latest security update, including allowing users to log in to most apps with their regular Apple ID instead of a social media account (such as Facebook) or an e-mail contact address. This blocks the app’s access to valuable private information.

While this is a great step, Android 10’s been taking things further. Android also has application access restrictions to track permissions and block them in the Settings tab of your phone. However, they also have advanced options, such as autofill permissions, which can be fully controlled. This goes further in offering you mastery of what is and is not allowed to be accessed by apps.

Bluetooth sniffing

After Wi-Fi is disabled, apps can still connect to sister programs by “sniffing” Bluetooth signals. It runs the risk of exposing and leaking location information. What’s more, Bluetooth has shown that it leaves devices vulnerable to malware attacks. Luckily, both Android 10 and iOS 13 have taken steps to deny apps permission to do this.

Verdict

All Android 10 and iOS 13 have already taken steps to protect personal data and to strengthen security. Apple still has some of the strongest fortifications, but Android is catching up. They have both evolved to meet the digital threats and requirements that face us today.

 

Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.