Android VS Ios
Android VS Ios
IOS VS ANDROID
Worms
This virus is created with the ability to replicate between computers. It often causes
network errors, as a result of abnormal bandwidth consumption caused by this
malware. Cybercriminals often use flashy names on links to get this virus
downloaded, such as the words: sex, betting, gift or prize.
How to avoid it
- Have your system and defenses updated to be protected
- On PCs and laptops, disable the "auto-run" function on external drives (USB
sticks or hard drives.
- If the antivirus is up to date, it will identify and eliminate this type of threats that try
to sneak into our devices.
Trojan
This type of virus is presented as legitimate software,
but that, when executed, allows the attacker to take
control of the infected device. As a result, your personal
information would be at permanent risk, at the mercy of
the attacker to steal everything they wanted from your
infected computers.
How to avoid it
- Put into practice all the above measures: have updated the operating system and
antivirus, scan the USB devices that are going to connect to your computer,
- Be careful when browsing the Internet, visiting fraudulent websites can cause you
to end up installing something in the background.
History and security of IOS
The history of iOS, from version 1.0 to 14.0 has been a great escalation in terms of variety
and popularity. iOS is the name of Apple's operating system that runs iPhones and iPods.
It is the main software that comes loaded on these devices to allow them to run and
support other applications that has also become the stone in the shoe of Google Android.
The first time the world saw Apple's operating system was on January 9, 2007 when Steve
Jobs showed the public the first iPhone. What made it so special back then was support
for features like multi-touch screen, Visual Voicemail, iTunes integration, and a pre-
installed YouTube app for watching videos, significant advances over the rest of the
mobile devices released to date. At first it did not have a predefined name so it was known
as iPhone OS, but later it would adopt its current name by adding improvements described
below. Thus would begin the history of iOS until version 14.0. iPhone is designed to
protect your data and privacy. Built-in security features help prevent anyone else from
accessing iPhone and iCloud data. Built-in privacy features minimize the amount of
information available to anyone else and you can adjust what information is shared and
where you share it.
Protect iPhone Access
Set a secure code: Setting a code to unlock your iPhone is the most important thing you
can do to protect your device.
Using Face ID or Touch ID: Face ID (supported
models) or Touch ID (compatible models) provides a
secure and convenient way to unlock your iPhone,
authorize purchases and payments, and sign in to
many third-party apps. See Set up Face ID on iPhone
or Set up Touch ID on iPhone.
Turn on Find My iPhone: Search helps you find your iPhone if it's lost or stolen and
prevents anyone else from activating and using your iPhone if you've lost it.
Control which features are available without unlocking your iPhone: Allows or denies
access to some commonly used features—such as control center and USB connections—
when the device is locked.
Your Apple ID provides access to your iCloud data
and account information for services like the App Store
and Apple Music. For information about how to protect
the security of your Apple ID, see Strengthen the
security of your Apple ID on iPhone.
WireLurker: It is the most dangerous malware for iOS. It spreads via USB and can
install malicious apps that pretend to be legitimate apps from the App Store.
However, they are actually modified to hijack the iPhone or iPad or steal the
access keys. You don't need the device to be jailbroken.
KeRanger: It is the first ransomware with the ability to attack Mac OS X. It encrypts
all the files on the computer and asks for a ransom to unlock them.
Yontoo. It's a seemingly harmless browser extension, but it actually injects
malicious advertising that links to compromised sites.
MacVx: This is an annoying adware classified as a Potentially Unwanted Program
(PUP). It attacks almost all browsers and what it does is show false or malicious
advertising.
CoinThief 2014: This Trojan for Mac OS X installs harmful browser add-ons that it
uses to steal the credentials of websites dedicated to
the exchange of bitcoins or sites that support them as
payment.
iWorm 2014: It is a virus for iOS and Mac OS X that
can install applications that steal the keys of all the
services you use. In addition, it can also connect your
device to a network to make DDoS attacks.
Janicab: Malware that takes screenshots and records the audio of the videos you
play to steal your private data.
LaoSh: It spreads through a fake email from a courier company, which includes
taking the victim to a website where he can download a file that takes over the
computer.
MacInstaller: It is one of the oldest scams that continues to be a threat today.
They take the user to pages where they inform that the computer has viruses and
recommend downloading Mac Defender, a supposed antivirus program that is
actually malware that steals credit card data, among other personal information.
Operating Advantages Disadvantages
system
IOS OS X, UNIX(CLOSED CODE) Few customization options
Better performance High cost
Increased security Poor battery performance
Sync in iClude External storage
Excellent usability Apple Maps
Siri
App Store
iOS Mobile Interface
Software updates constantly
Full connection to other iOS
devices
Personalization of the approach