Are mobile devices insecure by nature? [source: welivesecurity]

It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have by now become well established: Bring Your Own Device (BYOD), Choose Your Own Device (CYOD), Bring Your Own App (BYOA) and Bring Your Own Cloud (BYOC), among others.

Along with our growing dependence on these devices, we have been witnessing new advances, both in hardware and software architectures, which clearly demonstrate that Moore’s law continues to apply. These developments have been accompanied by a large body of research aimed at enhancing mobile security.

However, the prevailing public perception still views even the most capable phones as less secure devices than the average desktop computer, even with applications running in sandbox environments and with operating systems that are increasingly focused on security.

A quick analysis – whether dealing with ensuring physical or logical access, the authentication of digital identities, platforms for software tokens, or even the use of mobile phones as tools for verifying transactions in desktop computers – shows that mobile devices have by default an equivalent or better security posture than ordinary computers.

For more, click here.