TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

Apple’s App Store fraud review

by Mark Rowe

Last year, Apple stopped over $2 billion in potentially fraudulent transactions and blocked nearly two million risky app submissions from reaching users, the tech firm reports. Apple detected and blocked over 10,000 illegitimate apps on pirate storefronts, which include malware, pornography apps, gambling apps, and pirated versions of legitimate apps from the App Store.

Of 7.7 million App Store submissions reviewed in 2024, more than 1.9 million were rejected for failing to meet Apple’s standards for security, reliability, and user experience, including for privacy violations or fraud concerns. A common tactic used by fraudulent developers can include concealing hidden features and functionality in their code, which are only enabled after the app passes App Review. Apple monitors for such behavior, and in 2024, rejected over 43,000 app submissions for containing hidden or undocumented features.

More at https://www.apple.com/newsroom/2025/05/the-app-store-prevented-more-than-9-billion-usd-in-fraudulent-transactions.

Comment

Adam Boynton, Senior Security Strategy Manager EMEIA at Jamf, said: “Apple’s report highlighting the prevention of $2 billion in App Store fraud is a clear signal of both the rising sophistication of mobile threats and the strength of Apple’s security model. Criminals are increasingly turning to fake apps, ranking manipulation, and social engineering to exploit users. Apple’s layered defences, including its App Review process, strict privacy policies, and real-time monitoring, help create one of the most secure app platforms in the world.

“However, as threats continue to evolve, particularly with the rise of advanced malware and targeted attacks, organisations must look beyond app vetting alone. It is essential to secure the entire device experience, not just the point of download. Apple sets a strong baseline. The next step is for businesses to take ownership of mobile security and deliver trusted, secure experiences from install to impact.”

Related News

  • Cyber

    Risk during AI adoption

    by Mark Rowe

    CISO Andrew Smith at Kyocera Document Solutions UK explains how he’s responded to the cyber risks associated with AI and how businesses…

  • Cyber

    Cyber as a trust issue

    by Mark Rowe

    Cybersecurity isn’t a tech issue – it’s a trust issue, say Jake Upfield, pictured, Head of Solutions Advisory at Cybit and Tim…

  • Cyber

    CNI umbrella

    by Mark Rowe

    The UK’s Critical National Infrastructure (CNI) spans 13 distinct sectors, from energy and utilities, to transport, healthcare and public broadcasting. Each has…