Android Buyer Beware: 12 Least Secure Phones - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Android Buyer Beware: 12 Least Secure Phones
Newest First  |  Oldest First  |  Threaded View
User Rank: Moderator
11/23/2011 | 5:07:18 PM
re: Android Buyer Beware: 12 Least Secure Phones
Great point. I hadn't realized that OTA updates working for older devices with iOS5 too, thanks for the heads-up. There's another reason to update to iOS5 if you're using an older version. And yes, the "iron grip" has upsides and downsides. But I doubt this research will convince anyone to go for one platform over the other. More to beware of companies pushing Android handsets that don't get updated. (Besides the security downside, that means you're also missing out on the latest features.)

Must disagree. Security 101: Older versions of any operating system have more known vulnerabilities, which makes using them more risky, because they're easier to attack/exploit. Goes for Windows, Mac OS, Linux, Android, or iOS. (Orphaned iOS devices, notably, are susceptible to a well-known man-in-the-middle data sniffing attack.) But whereas Windows and iOS push updates in a relatively timely fashion, *many* of the manufacturers and carriers that use Android do not. If you find nothing wrong with that situation, more power to you.

Apologies for the lack of easy scannability. Bullet-listing all of the phones is a great idea, though seemed like it might take up quite a lot of vertical space. But we'll add a link to the actual report, which offers the info in a more easily digestible fashion. And I'll talk to the website elves about a bandwidth infusion.
Leo Regulus
Leo Regulus,
User Rank: Apprentice
11/23/2011 | 3:13:16 PM
re: Android Buyer Beware: 12 Least Secure Phones
hmmmm....... There wasn't really a 'list' here, was there? You had two sentences with the cited subjects separated by commas. Not really 'reader-friendly' (IMHO). So, I pasted the whole thing into a Word Doc and hit Enter after each one of those commas. I blocked the resulting column and hit the columns function for 3 columns. VOILA !! Something that I can read and grasp at a glance. Okay, so I've got too much time on my hands, but you've got to do better for us dyslectic kids. And one more thing, your pages are loading MUCH to slow and I often open several at a time while others are continuing to load. You probably need to add some more bandwidth to you budget. Have a Happy Holiday !
User Rank: Apprentice
11/23/2011 | 12:00:17 AM
re: Android Buyer Beware: 12 Least Secure Phones
That is the most ill informed story I have ever read about Android security.

It cites pretty much one source and an Apple genius bar. Earlier versions don't make Android a security threat. People downloading third party apps after unselecting a check mark for allowing third-party apps, going to some shifty site in Russia, downloading, ignoring the permissions warning and then using app. Besides even spreading a virus though a phone network is highly unlikely.

Android security apps are a scam.

This story more like an Apple products PR plant.
User Rank: Apprentice
11/22/2011 | 11:29:41 PM
re: Android Buyer Beware: 12 Least Secure Phones
Um ... my iPhone 4 can do over-the-air updates, as can the 3GS ... once iOS 5 is installed. When the 5.01 update came out it definitely surprised me since I was used to "gotta dock it to update it." But it went without a hitch.

That by itself doesn't make the iPhone more or less secure than its Android brethren, but I think Apple's iron grip on iOS might.

State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
What Becomes of CFOs During Digital Transformation?
Joao-Pierre S. Ruth, Senior Writer,  2/4/2020
Fighting the Coronavirus with Analytics and GIS
Jessica Davis, Senior Editor, Enterprise Apps,  2/3/2020
IT Careers: 10 Job Skills in High Demand This Year
Cynthia Harvey, Freelance Journalist, InformationWeek,  2/3/2020
Register for InformationWeek Newsletters
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll