Feeds

Two scam apps stink up iTunes store, pulled thanks to Reg reader

Eye of the Vulture backs up porous Cupertino iron curtain

3 Big data security analytics techniques

Apple allowed two scam apps to appear in its App Store - and the dodgy software remained on sale for five days until a Reg reader raised the alarm.

The two paid-for programs, built by developer JB Solutions, do not work as advertised in the online shop, sparking a surge in negative feedback comments left by ripped-off fanbois. Both apps were approved by Apple's censors and went live in the software store on 8 November. They were eventually pulled last night after we contacted the fruity firm.

The first app, IntelliScreenX for iPad and iPhone, cost $1.99 (£0.99) and promised a pull-down list of notifications from the device's lock screen. Such a feature is not possible on iOS, although it can be done on jail-broken iPhones.

Users reported that, once downloaded, IntelliScreenX simply showed an alarm clock. The app looked nothing like the screen grabs displayed in the iTunes store front.

The second dodgy program, NFC for iPhone 5, cost $0.99 (£0.69) and promised to enable Near-Field Communications support - useful for making wireless payments - in the smartmobe. Again, that's impossible because the iPhone does not have an NFC chip fitted. As soon as the software is downloaded it changes its name to RadioStreamer and plays music from online stations.

Screen grab of scam app NFC for iPhone 5 from Apple's iTunes

Screen grab of the scam app NFC for iPhone 5 advertised in Apple's iTunes

It's not clear whether the phony apps pose a security risk, but it is clear users ended up paying out for software completely unlike what was expected.

User feedback left on iTunes

Unhappy customers

Oddly enough, there were 20 to 30 positive recommendations and five-star reviews for the apps, no doubt snagging a number of customers, although a lot of negative comments have since appeared.

The Reg asked Apple how something so wrongly advertised could be stocked on the App Store's shelves given the Cupertino giant screens every product submitted by developers. A spokesman would not provide any detail, but told us: "Thanks for bringing this to our attention." ®

Top three mobile application threats

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.