Android and iOS device manufacturers, Google and Apple are well-known for the level of control and security they build into their products. However having a reputation of being hard to crack makes their systems more vulnerable to exploitation in one sense as it is seen as a challenge by hackers, an attractive prospect for this particular group of people.
An example of the levels of security as explained by Forbes in their article, if a private corporation wishes to use Apple’s iPad to deploy apps using an internal workforce, they must first register with the company’s iOS Developer Enterprise program. This is so that Apple is aware of the details and background of the corporation first and prevents illegal app distributers from uploading their potential malware products.
Another way that Apple retains control is by constantly updating their iOS versions, the updates usually provide patches for vulnerable parts of the system and prevent hacked devices from benefitting from the official Apple services. The system is of course not entirely flawless as Apple still does not have control of unforeseeable events such as a device being lost or from phishing scams. From September 2009 to May 2011 116 data breaches were recorded as a result of stolen or lost devices, resulting in the exposure of over 1.9 million patients’ records, according to a study from the US Department of Health and Human Services Office for Civil rights.
The iPad 3 is expected to be revealed next month and with Apple’s reputation hackers will be looking forward to the opportunity of getting their hands on this device in order to see what they can get out of it once it has been jailbroken. Do you think Apple has prepared for the attractiveness their iPad 3 poses towards hackers or are they more vulnerable than ever?