Tuesday, October 18, 2016

Microsoft says that iOS is just as vulnerable as Android – Leak – Leak

The discussion concerning which of the operating systems for mobile devices is more vulnerable is quite frequent. Some say that the Android, others say it is the iOS, and others claim that the Microsoft system is the most susceptible to catching the virus.

This week, one of the Microsoft executives, decided to launch one more think to the fire, and put a message on the blog of the company where you have indicated that, in his opinion, that the iOS is just as vulnerable as the operating system of Google, Android.

Brad Anderson picked up a practical example and reminded that at the end of August, the security company in iOS devices, Lookout has revealed a spyware baptized 'Pegasus' which explored a number of shortcomings and allowed the hackers to encroach on an iPhone or iPad. From this idea he concluded that there were no systems are 100% safe because all are vulnerable.

The Microsoft executive, Brad Anderson, has revealed that, over the past two years, has heard many executives talk about the confidence "unshakable" in the iOS platform, and as Android is one of the most weak and vulnerable.

"I Know that all manufacturers and developers of mobile operating systems make a great effort to ensure that their systems are as safe as possible, however, there are cyber threats that often manage to carry out attacks with success regardless of the efforts that the companies creating operating systems perform," said Brad Anderson.

The Microsoft executive also said that currently, the senior officials of the companies have several mobile devices, and that those who have access to they may have access to extremely important information about the daily life of these responsible. At the same time, Brad, claims that currently, in this digital era, there are only two types of companies: those that have already been attacked and those that still do not know that they were…

as Well, and to avoid problems, Brad Anderson, leaves four recommendations:

  • Assume always that there was an invasion
  • to Build a defense-in-depth
  • to Be always up to date
  • Think holistically

in a Nutshell, the question is not which is the system that you use, but how we deal with it, and what care we for his safety, since it will be these key points to have a device more or less secure…

LikeTweet

No comments:

Post a Comment