Skip to main content

Posts

Android vs iPhone Security: Why No System is 100% Secure

When I went to the CYBERUS Spring School in early April 2025 (April 7–11, 2025, at Université Bretagne Sud in Lorient, France), one of the topics we talked about was the age old query: Which phone is safer, the  iPhone or the  Android ? The conversations were instructive to me as a security enthusiast. We discussed technical ideas like mobile app sandboxing and even how two apps from the same developer could access data in spite of platform security measures. The discussions underlined an important realization I've had over the years: while IOS and Android both have robust security mechanisms, neither is completely impenetrable. In this essay, I'll provide a professional (but hopefully easy-to-read) analysis of Android vs iPhone security, interspersed with my own viewpoints, demonstrating why no system can claim perfect security. Security by Design: IOS and Android Approaches Apple's IOS and Google's Android have fundamentally different approa...
Recent posts

Behavioural Authentication System : Introduction

Behavioral authentication is an emerging paradigm that leverages unique human behaviors—such as keystroke dynamics, mouse movements, and gait patterns—to verify identities continuously and unobtrusively. This review by Wang et al. categorizes behavioral authentication into three complementary levels—identity, conformity, and benignity—each addressing distinct security and safety concerns within digital systems ( sands.edpsciences.org ). After tracing its evolution from traditional, intrusive methods (passwords, tokens, biometrics) to frictionless, continuous approaches, the article surveys state-of-the-art studies across these three levels. It then examines key challenges—data variability, model robustness, privacy, and integration with existing infrastructures—and outlines promising research directions such as multimodal fusion, explainable AI, and adaptive systems to foster a safer, more secure cyberspace ( sands.edpsciences.org ). Introduction to Behavioral Authentication Behavior...

Nepal’s Cybersecurity Landscape: A Comprehensive Evaluation of Existing Policies, Challenges, and Strategic Recommendations

1. Introduction and Context 1.1 Overview of Nepal’s Current Cybersecurity Landscape Nepal’s rapid shift toward digitalization, evidenced by the growing use of e-governance systems, mobile banking, and online platforms, has outpaced the development of its cybersecurity infrastructure and policies [1]. This imbalance has exposed government institutions, private organizations, and citizens to escalating cyber threats. The present cybersecurity landscape in Nepal can be summarized by several critical factors: A. Recurring Data Breaches and Minimal Accountability: A string of high-profile breaches underscores the vulnerability of Nepal’s digital environment. Most recently, the personal information of 7,400 students from the Institute of Engineering (IOE) was put up for sale on the dark web, leaking names, addresses, dates of birth, and phone numbers [2]. Earlier incidents include: 2017: Department of Passport hacked; NIC Asia Bank breach attempted to transfer USD 4.4 mill...