In the 21st century, there is a substantial rise in the number of smartphone users as they become the preferred devices for connecting to the internet for web browsing, emailing, social media, and e-commerce. Smartphones are used for a range of personal and business tasks following technological improvements that enable them to replace computers in specific tasks. In this light, smartphones are used for both personal and professional tasks and are increasingly replacing the personal computer (Hall and Anderson 2009). The ease of handling the device enables the user to perform operations that are executed in the personal computer. The size of smartphones allows users to easily carry them around taking critical technological innovations in information technology with them everywhere for convenience (Soneira, 2013). The communication capabilities include texting, calls, and use of internet platforms and performing sensitive financial transactions implies that there is a large volume of data gathered and available on phones. The smartphone holds different data formats based on the user’s interests. In this light, the large volume of data and the growing concern for privacy has influenced a growing concern for security issues in the smartphone systems. Information security has taken center stage in the modern day with the rising figure of users across the globe as well as the value associated with personal data. Although smartphones present substantial advantages, they also present challenges presented by personal computers such as risks of data exfiltration using viruses, malware, and spyware. Suggestively, smartphones have become a key target for cyber attackers.
The operating systems in smartphones lack strong security features that can guarantee significant protection from data loss and cyber attacks. It is evident that there are numerous loopholes, which can be exploited by cyber criminals to access information on smartphones. These vulnerabilities are detrimental to the successful use of smartphone technologies, which highlights the increasing need for effective security solutions. The leading smartphone operating systems are Android and iOS. Android is used by most of the technology developers in the smartphone sector while iOS is used for Apple’s iPhone (Renner 2011). These platforms are used to run thousands of applications that increase the risks of data security. In the same context, there are substantial efforts by the key technology developers as well as small players in the industry to enhance the security features of the smartphone OS and applications. With numerous and innovative applications in Android and iOS as well as other platforms the users are mostly unaware of the risks that are presented by these apps. A key concern has been user privacy and data protection with increased use of these devices for financial and corporate transactions. In this light, there has been a continuous debate on which OS platform that offers substantial security features. While researchers have identified iOS to be safer compared to Android, recent cases of spying bug linked to iPhone’s Facetime highlight that the platform is not immune. Reviews highlight that the existing security frameworks require…