Apple Issues New Blow To Google With This Bold Security Move

Apple has already been very vocal about the security and privacy built into its iOS 13 operating system update, which hits out at firms such as Google and Facebook by limiting the data they can collect. After making a bold privacy move a month ago, Apple is now doubling down on security, by launching a new Platform Security Guide detailing how its iPhones, iPads and Macs are more secure than Google’s Android devices, because the firm owns the whole ecosystem.

Apple’s devices have always been regarded as more secure, because Apple owns the hardware, software and apps. In contrast, although its biggest smartphone rival Google does make some of its own Android phones and has a level of control over its app store, the often separated hardware, software and platforms can make things very fragmented and pose security risks.

Apple’s security guide for Fall 2019 doubles down on how Apple keeps your devices and data secure across iOS and MacOS. It covers hardware security and biometrics such as Face ID and Touch ID–which is thought to be returning with the iPhone 12 next year–among other areas.

The Platform Security Guide reads: “Every Apple device combines hardware, software, and services designed to work together for maximum security and a transparent user experience in service of the ultimate goal of keeping personal information safe.

“Custom security hardware powers critical security features. Software protections work to keep the operating system and third-party apps safe. Services provide a mechanism for secure and timely software updates, power a safer app ecosystem, secure communications and payments, and provide a safer experience on the Internet.

Apple’s iPhone, iPad and Mac security guide: A “commitment” to security? 

As part of the guide, Apple emphasises its “commitment” to security–which could be seen as a direct swipe at Google and Facebook as companies that have seen their own share of data and security scandals. Apple points to its bug bounty program, which is now open to all ethical hackers, and dedicated security team as reasons it is more secure.

But at the same time, it’s important to note that Apple isn’t perfect: it came under fire from lawmakers recently after it emerged that the firm wasn’t applying the same controls to its own apps that it applies to others. With this in mind I created a useful guide to securing your apps in iOS 13, including Apple’s.

Another cool new feature in iOS 13.3 is the ability to use security keys with your iPhone in Apple’s Safari browser. I wrote an article including more information and a video demo on how to use it.

Follow me on Twitter.

I’m a freelance cybersecurity journalist with over a decade’s experience reporting on the issues impacting users, businesses and the public sector. My interests within cybersecurity include critical national infrastructure, cyber warfare, application security and data misuse. I’m a keen advocate for women in security and strive to raise awareness of the gender imbalance through my writing.

Source: Apple Issues New Blow To Google With This Bold Security Move

1.09M subscribers
In an interview with Charlie Rose, Apple CEO Tim Cook has hit out against accusations that his company is a liability to users, saying that unlike other companies, Apple has no interest in collecting customers’ data. Watch the interview in the video. Comment below and share your thoughts on this story! Subscribe to The Rubin Report: http://www.youtube.com/subscription_c… Follow Dave on Twitter: https://twitter.com/RubinReport Like Dave on Facebook: https://www.facebook.com/daverubin More Dave Rubin: http://daverubin.tv/ Host: Dave Rubin @RubinReport Guests: Dylan Brody @dylanbrody Rick Overton @rickoverton The Rubin Report is a comedy and current events panel show on The Young Turks Network hosted by Dave Rubin. Comedians, celebrities and media personalities join Dave each week to discuss hot topics in the worlds of news, politics, pop culture and more.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: