Feeds

Apple bans fraudulent developer from iTunes

400 compromised accounts linked to scam

Beginner's guide to SSL certificates

Apple has confirmed that iTunes accounts were compromised to make fraudulent purchases, and has banned the developer at the centre of the scam.

Thuat Nguyen managed to briefly push 42 of his releases into the top 50 book apps in the US iTunes Store last week, triggering suspicions of foul play. After earlier suspending the Vietnamese developer's account, Apple has brought the ban-hammer down on Nguyen for violations of its Developer Program License Agreement, TechRadar reports.

In a statement, Apple said the 400 accounts were compromised to make fraudulent purchases. "If your credit card or iTunes password is stolen and used on iTunes we recommend that you contact your financial institution and inquire about cancelling the card and issuing a chargeback for any unauthorised transactions," Apple said.

Security firms reckon the scam bears the hallmarks of a phishing attack, where victims are tricked into handing over login credentials.

Apple, meanwhile, is keen to stress that it was individual accounts, rather than the iTunes Store itself, that were affected by the breach. Even so Apple has promised to review the security of its servers and to tighten controls, the BBC reports. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.