Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

In the personal computer industry, software makers generally release fixes more quickly. Automated software updates have become necessary features of applications and operating systems, and are typically applied frequently. As a result, PC and Mac users can expect to have issues fixed on their systems in 30 days on average, according to research by security firm Qualys.

Apple vets iPhone applications before making them available through the App Store—which Google does not do with the Android Market. But security fixes for the iPhone are also implemented more quickly because Apple does not rely on carriers to distribute security fixes for the operating system or for applications.”[Apple] doesn’t have to deal with a bunch of devices,” says Lanier. “Their walled garden gives them the control to react more quickly.”

“From a security standpoint, the more automated this stuff is, the greater the penetration of the patching will be and the better off everyone will be,” says Tom Cross, a security researcher with IBM.

Hackers are turning to methods that were originally developed to allow phone users to avoid restrictions imposed by carriers. This practice, known as “jailbreaking,” lets iPhone and Android users give their devices new functionality—such as turning it into a mobile Wi-Fi hotspot—without paying extra to the carrier.”The place where we are seeing mature reliable exploit code being disseminated are for vulnerabilities that people are using to jailbreak their phones,” says Cross. “Those exploits can be used for malicious purposes.”

0 comments about this story. Start the discussion »

Credit: Lookout

Tagged: Communications, security, iPhone, Android, mobile phones, mobile devices, hackers

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me