Security holes could give hackers access to iOS, Android devices
Apple has an edge in a couple of areas, but there are still ways into its walled garden, Marble Security warns
IDG News Service - Apple's tight vetting of mobile applications gives it a security edge over Android, but there are still several ways for attackers to steal data from iOS devices, a mobile security company warned in a report Tuesday.
The report looked at the risk factors facing users of the platforms, concluding that enterprises still face data breach risks regardless of the platform used.
"Neither iOS nor Android is inherently more secure than the other," according to Marble Security. "The risks to enterprises allowing employees to bring in their own devices, whether iOS or Android-based, are not that dissimilar."
For iOS users who haven't jailbroken their devices, the only source of applications is the App Store, which Apple closely monitors for potentially malicious applications. But Android users have a choice of many marketplaces outside of Google's Play store which may not analyze applications for bad behavior, the report said.
Apple has another small advantage in that iOS has much less "fragmentation," or a multitude of versions and configurations of its operating system. In contrast, Android is heavily fragmented: Marble Security counted 11,868 types of devices that run myriad versions of Android.
Those Android versions "may have security vulnerabilities, old patch levels, insecure configurations or unsecured apps installed from the factory," the report said.
Still, there are a couple of avenues into the "walled garden" of iOS, it said. For example, an application not from the App Store can be installed on a non-jailbroken device using TestFlight, which is a platform for distributing beta apps to select user groups.
"While Android devices can more easily obtain apps from non-vetted sites, there are many ways for iOS apps to also get onto devices, which spells trouble for the enterprise," Marble said.
iOS faces risks from mobile device management configurations, which can be delivered via a website. That kind of attack would require using social engineering to lure someone to a website and convincing the person to install a malicious configuration, the report said.
But "if that user installs a hostile configuration profile, then the enterprise is at risk for intercepted traffic, fake app installation, sophisticated phishing and APTs (advanced persistent threats)," Marble said. "We have seen many tactics used to deceive users to install these profiles."
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!