Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Banned privacy watchdog app Clueful has re-emerged on the internet and has discovered iPhone apps that send passwords over WiFi in clear text.
The iPhone version of the app was taken down from Apple’s app store in June after it was initially approved. The Cupertino giant refused to discuss the move and gagged developer BitDefender under a non-disclosure agreement from doing the same.
Clueful would scan installed iOS applications purchased for free from the app store to show users the privacy and security measures and risks the software presented.
The latest incantation skirts Apple’s ban by serving the application as a web app, meaning it lacks the ability to scan iOS devices for installed apps and integrated touchscreen functions.
"It cannot see any of the apps on iPhone, but users can search them on the web, Bitdefender's head of online threats Catalin Cosoi said.
He said he hoped Apple would lift the ban within months, and said only that Cupertino did not ask for Clueful to be redesigned, leaving open questions that the app may have violated Apple's app policies.
Apple's local spokeswoman did not return a request for comment.
While Clueful was no longer an iPhone app, it has been resigned to detect new security gaffes, including whether apps fail to encrypt login credentials or encrypt the data using the defunct MD5 hash. This would expose the data to interception when it was sent over unprotected wireless networks.
BitDefender’s Clueful team dug up three such apps for SC including Opera (operatory) Pager, a paid subscription app designed for sending messages between PCs, Mac and iOS devices in hospitals and general practitioner clinics.
Two further apps, Virtuoso and Chinese Writer also sent passwords in clear text or hashed with MD5.
A further cursory search on Clueful by SC found the official Qantas Frequent Flyer app exposed usernames in the same way. Online banking and popular e-commerce apps appeared to encrypt user data, though many tapped into location, contacts and social media such as Twitter.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.