II. iOS VS. ANDROID SECURITY OVERVIEW By reviewing the literature we investigate different security aspects for iOS and Android. In [8] authors developed an evaluation criteria for different OSs used in smartphones. They filled their evaluation by implementing a location tracking malicious attack. The results of their study showed that there is a very high percentage of such attack in the smartphones those are built on Android OS. Many vulnerabilities are revealed. The malicious application testing, i.e., the detection of malicious applications is not performed during the application distribution for Android OS, this is one of the major weaknesses. There is no restrictions on the source of the application (official or not market, moreover WWW or removable media, etc ...) . Android only executes some restrictions for the application signing and API control. The authors agreed that this offers incomplete security protection and the only strength in the Android is the remote removal mechanism. Turning over to the iOS, iPhone is considered a high secure smartphone. No unofficial market is used in iOS. The application before its uploading in the official market, it must be reviewed and signed by Apple. Also, the remote removing of suspicious application is possible with Apple. The only vulnerability mentioned is the uploading of location data to a remote server is taken place without the sense of the user.