Android vs. iOS: Which is more secure?
Jan. 14, 2021
Norton™ 360 for Mobile
Powerful protection for your mobile device and online privacy – plus Dark Web Monitoring Powered by LifeLock™.
It’s more important than ever to make sure your mobile devices are secure and your personal information stays private. Norton 360 for Mobile helps deliver powerful, proactive protection for your device and personal information against stealthy cyberthreats and online scams.
Remember the days when cybercriminals primarily focused their attacks on laptop and desktop computers? Times seem to be changing. Today, cybercriminals are targeting smartphones and tablets more often. And if this is true, then it begs the question: Which mobile operating system is more secure, Android or iOS?
It’s little surprise that, as consumers increasingly use their mobile devices for banking, connecting on social media, and making online purchases, cybercriminals are aiming their virus and malware attacks on iPhones, iPads, and Android devices. The iOS and Android operating systems, then, have become tempting targets for cyberthieves eager to access the most personal information of users.
If safety is your main concern, and you want to keep your Android or iOS device free of viruses and malware, which operating system should you choose?
There is no simple answer.
Android vs. iOS: The threat level
In some circles, Apple’s iOS operating system has long been considered the more secure of the two operating systems. Why? Apple’s operating system is a closed system. Apple doesn’t release its source code to app developers, and the owners of iPhones and iPads can't modify the code on their phones themselves. This makes it more difficult for hackers to find vulnerabilities on iOS-powered devices.
Android devices are the opposite, relying on an open-source code, meaning that the owners of these devices can tinker with their phone’s and tablet’s operating systems. Too much tinkering, and owners might create a weakness in their devices’ security. Then there are manufacturers themselves. If a phone maker puts out a new device with a modification to the Android operating system and there’s a vulnerability in that code, hackers will find it.
Android is more often targeted by hackers, too, because the operating system powers so many mobile devices today. The global popularity of the Android operating system makes it a more attractive target for cybercriminals. Android devices, then, are more at risk of the malware and viruses that these criminals unleash.
But this doesn’t tell the entire story. While iOS may be considered more secure, it’s not impossible for cybercriminals to hit iPhones or iPads. The owners of both Android and iOS devices need to be aware of possible malware and viruses, and be careful when downloading apps from third-party app stores. It’s safest to download apps from trusted sources, such as Google Play and the Apple App Store, which vet the apps they sell.
Then there are the social engineering attacks in which cybercriminals attempt to trick users into giving up log-in information, access to bank accounts, and other personal data. It doesn't matter what mobile operating system you are using: both iOS and Android can be equally vulnerable to these types of phishing attacks.
Android and iOS software updates and security updates
Want to help keep your Android phone or tablet safe? Always upgrade your mobile devices to the latest version of the Android OS. Android regularly releases updates. It can be tempting to skip the installation of them, especially when life gets busy. But these updates are designed to help protect your Android devices against the latest security threats. Ignoring these updates could put your phone or tablet at risk.
Apple’s iOS updates tend to be bigger events, typically prompting iPhone and iPad users to install them as soon as they are released.
Of course, the owners of both Android and iOS devices can turn on automatic updating on their mobile devices. This way, when Android or iOS updates are released, their devices will automatically update to the latest versions of their operating systems.
Much of the security of an Android device depends on the hardware. Simply put, some manufacturers are better at making sure Android’s built-in security features work correctly.
A good example is Samsung. The Samsung Knox security solution comes pre-installed in all of the company’s phones, tablets, and wearable devices. This platform provides a more secure booting process, helping to prevent unauthorized software from loading when a user turns on a Samsung mobile device.
How to stay safe on Android and iOS
Many users find Android attractive because it is a more open operating system. This means, though, that you need to be more cautious. But keep in mind, you also have to be cautious with iOS.
Consider all the apps you download. Downloading a rogue app is the easiest way to infect your Android phone, tablet, or wearable device with malware or a virus. The same can be true for iOS, especially if you download an app from a third-party source. That’s why it’s important to download apps only from reputable sources.
Your best bet? For Android, stick to the Google Play store. Google Play features countless apps. You really have no reason to download Android apps from any other location. If you do venture outside Google Play, you could likely increase your chances of downloading an infected app. The same goes for iOS. It’s best to go to the Apple App Store.
Android vs. iOS: How does the mobile operating system of each impact their security?
Here’s a look at the Android operating system.
Android operating system
Popularity: The Android operating system is hugely popular. This means that developers are constantly building new apps designed to run on the system. That’s good for users ... mostly. The problem comes when hackers create apps designed to infect your mobile devices. There is an app review process for Google Play. Unfortunately, the process is far less stringent than what developers face when adding apps to Apple’s App Store. It's easier, then, for malicious apps to sneak onto the Google Play store and easier for users to accidentally install one. One of the main issues is that the end user can go into a Android device and enable the installation of software from Unknown Sources. This means that you can install software on the Android device that does not come from the Google PlayStore. The software — or APK, as it’s called — can be downloaded and installed from a website bypassing the Google PlayStore review.
Open source: Android owners can modify the source code of their Android devices. This appeals to users who want the flexibility to change the way their mobile devices run. But it can also make Android devices vulnerable to attacks. When altering their device’s source code, users could accidentally leave an opening for cybercriminals.
Fragmented: Unlike the iOS operating system that only runs on Apple-branded products, the Android operating system runs on mobile devices manufactured by a host of companies. Some companies might provide hardware that is more secure than others. Moreover, the manufacturer of the device can use a custom ROM or base operating system that has software installed that cannot be easily removed or analyzed for malicious intent.
Here’s a look at the Apple’s iOS.
More stringent controls: It’s more difficult for developers to get apps into the App Store. That’s because the review process is more stringent. Because of this, it’s less likely for a malicious app to sneak into Apple’s store.
Less flexibility: Apple doesn’t allow the owners of its devices to modify its iOS operating system or custom ROMs to be loaded on their devices. That makes the system more secure since Apple controls the complete experience. This doesn’t stop some owners from “jailbreaking” their Apple mobile devices, modifying their source code. Jailbreaking opens new capabilities on the devices — such as changing digital-assistant Siri’s voice, for instance. Be careful if you do this: Apple won’t provide support to such devices.
A less tempting target: Because the iOS operating system powers fewer mobile devices, hackers don’t target the system as often. This makes sense: Hackers and cybercriminals can ensure more victims if they focus more of their attacks on the more popular Android operating system.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
Join today. Cancel anytime.
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.