Feeds

Two scam apps stink up iTunes store, pulled thanks to Reg reader

Eye of the Vulture backs up porous Cupertino iron curtain

Top 5 reasons to deploy VMware with Tegile

Apple allowed two scam apps to appear in its App Store - and the dodgy software remained on sale for five days until a Reg reader raised the alarm.

The two paid-for programs, built by developer JB Solutions, do not work as advertised in the online shop, sparking a surge in negative feedback comments left by ripped-off fanbois. Both apps were approved by Apple's censors and went live in the software store on 8 November. They were eventually pulled last night after we contacted the fruity firm.

The first app, IntelliScreenX for iPad and iPhone, cost $1.99 (£0.99) and promised a pull-down list of notifications from the device's lock screen. Such a feature is not possible on iOS, although it can be done on jail-broken iPhones.

Users reported that, once downloaded, IntelliScreenX simply showed an alarm clock. The app looked nothing like the screen grabs displayed in the iTunes store front.

The second dodgy program, NFC for iPhone 5, cost $0.99 (£0.69) and promised to enable Near-Field Communications support - useful for making wireless payments - in the smartmobe. Again, that's impossible because the iPhone does not have an NFC chip fitted. As soon as the software is downloaded it changes its name to RadioStreamer and plays music from online stations.

Screen grab of scam app NFC for iPhone 5 from Apple's iTunes

Screen grab of the scam app NFC for iPhone 5 advertised in Apple's iTunes

It's not clear whether the phony apps pose a security risk, but it is clear users ended up paying out for software completely unlike what was expected.

User feedback left on iTunes

Unhappy customers

Oddly enough, there were 20 to 30 positive recommendations and five-star reviews for the apps, no doubt snagging a number of customers, although a lot of negative comments have since appeared.

The Reg asked Apple how something so wrongly advertised could be stocked on the App Store's shelves given the Cupertino giant screens every product submitted by developers. A spokesman would not provide any detail, but told us: "Thanks for bringing this to our attention." ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.