Open source platforms are more vulnerable to hackers and viruses, according to Trend Micro chairman Steve Chang.
Speaking to Bloomberg news this week, Chang said that Google's Android operating system is more vulnerable to exploits than Apple's iPhone platform. He claimed that hackers can also understand the underlying architecture and source code of the Android OS as it is open, giving credit to Apple as ‘they are very careful about it', saying it was ‘impossible for certain types of viruses to operate on the iPhone'.
While he did claim that Apple's iOS is not fully immune to security threats and may be hit with social-engineering attacks, he did predict that Android users will start to buy more security software for mobile devices.
In a statement emailed to Bloomberg, Google said: “On all computing devices, users necessarily entrust at least some of their information to the developer of the application they are using. Android has taken steps to inform users of this trust relationship and to limit the amount of trust a user must grant to any given application developer.”
Chang's claims come a week after Trend Micro announced a mobile security product for the Android platform to protect digital files and secure banking transactions.
Bertrand Diard, CEO of open source data management company Talend, criticised Chang's comments claiming that open source products are not only mainstream but also are more secure and efficient for businesses than proprietary solutions.
He said: “Open source products have been clearly demonstrating that they are on par with proprietary software and this includes the security element. There is absolutely no reason why open source should not be considered amongst all software solutions.
“By nature open source products enable people to access its source code and provides greater flexibility than proprietary software and they are substantially more cost effective than proprietary software.
“Are they less secure? No, it is actually the opposite. Because open source gets many third party developers to review code, vulnerabilities are actually identified sooner than in closed, proprietary systems and project ‘owners', who select which code makes it or does not make it into the product, take very seriously their vouching responsibility.”