Feeds

Mac App Store giving away pay apps for free

Angry Birds vendor now even angrier

Protecting users from Firesheep and other Sidejacking attacks with SSL

Security oversights mean that many of the applications in Apple's newly launched Mac App Store can easily be obtained without payment.

A significant number of developers have disregarded Apple's advice on validating App Store receipts before making their software available through the store. As a result, many applications can be pirated.

Applications bought through the store can be modified to run by any Apple user (not just restricted to a specific Apple ID, prompting users to log into an account associated with a sale) without any further purchase. The omitted App Store receipt technology would have prevented this.

Popular application Angry Birds, for example, only checks for a valid receipt (of any type) and not whether this is a receipt for a purchase of this software tied to a specified account. A receipt from any legitimate Mac App Store download - including applications that come free of charge – will allow a bootleg download of Angry Birds to run, as explained here.

As things stand, some Mac App Store developers are potentially out of pocket while Apple misses out on its percentage from legitimate software sales. The App Store, launched along with the publication of OS X 10.6.6, provides a portal for the sale of desktop Mac applications. Customers benefit because it restricts the number of firms with which they are obliged to share their payment details.

The snafu also raises concerns that applications – modified to include back doors – might be uploaded to the App Store.

"Some applications downloaded from the App Store can easily be modified to include any sort of executable code you wish," warns Sophos security consultant Chester Wisniewski. "It wouldn't surprise me to see a surge in markets for pirated applications that might just be booby-trapped to include unexpected surprises." ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.