Android Security is enhanced by 'Jelly Bean' which has been refreshed with additional features such as preventing harmful apps from entering mobile device or blocking installation of bad apps.
Apple's iOS mobile and has garnered a reputation for strong security. Apple is one of the most popular and most visible devices. In this article there take about the pros and cons of jail-breaking your apple device.
in this article they talk about how malware could increase in apple device. As more business migrates to mobile devices and Apple's market share increases, the quantity of mobile- and specifically iOS-targeted malware will rise.
Android is widely accepted as being iOS' greatest rival, but, according to Dell SecureWorks security researcher Timothy Vidas, it has a host of issues that have made it a target for malware authors.
Poor permissions: the huge host of permissions that users must understand are driving them into information paralysis; they are choosing to ignore the warnings presented to them, and not considering whether they may be dangerous or unnecessary.
Open marketplace: Google Play does have an automated scanning program called Bouncer, but its effectiveness is as yet unknown. Therefore many Russian and Chinese alternative markets basically distribute 100 per cent malware
Inexperienced or malicious developers: if they don't have any malicious intent, the developers could introduce new vulnerabilities into the target device, or create features that have unintended side effects.
People are worried about Android's security problems which have been gradually getting bigger and bigger. The security firm has found out that more than 5,000 malicious applications designed to target Google's Android mobile operating system, and it has risen to about 20,000 recently.
Mobile device security requires persistence, diligence and, of course, common sense. In recent months, iOS and Android security have been hot topics of discussion in response to major breaches that impacted both operating systems this summer. their data breaches a legitimate but avoidable threat. In addition, software updates a necessity