


Apple closes 428,000 developer accounts and 282 million customer accounts to combat account fraud
News on May 17th, Apple recently issued a press release introducing the App A number of measures will be taken by the Store in 2022 to protect users from potentially fraudulent transactions and untrustworthy applications. It is understood that these measures are designed to ensure that App Store strictly adheres to privacy, security and content standards.
In response to the problem of account fraud, Apple has taken effective measures. In response to fraud and abuse, they closed 428,000 developer accounts and 282 million customer accounts. By introducing new methods and protocols, Apple continues to improve its mechanisms to continuously monitor and quickly detect account fraudulent activities, reducing the number of developer accounts suspected of fraudulent activities from 802,000 to 428,000.
Apple's Apple Developer Program also rejected 105 million applications suspected of fraudulent activity, effectively protecting users from nearly 57,000 untrustworthy applications. There are an average of more than 100,000 application submissions requiring review every week, and nearly 90% of applications receive review results within 24 hours of submission. In 2022, the Apple App review team reviewed more than 6.1 million application submissions and assisted more than 185,000 developers to successfully publish their applications to the App Store. The team has also conducted more than 20,000 calls with developers to help them resolve issues that may result in app submission rejections.
In addition, Apple processes more than 1 billion ratings and reviews. More than 147 million ratings and comments that did not meet moderation standards have been blocked or deleted. In terms of payment and credit card fraud, Apple successfully prevented a record $2 billion in fraudulent transactions in 2022 and banned 714,000 fraudulent accounts from conducting transactions again.
In short, Apple has successfully blocked a large number of potentially fraudulent transactions in 2022 through multiple measures and protected the App Privacy and security for Store users. Their efforts make it easier for developers to submit and publish apps to the App Store, while ensuring that users can enjoy trusted, high-quality apps and services.
ITBEAR Technology Information understands that in today’s digital era, user privacy and data security issues have become particularly prominent. Through technical and strategic means, Apple's actions demonstrate how to protect user interests and promote the healthy development of the digital ecosystem, affecting the entire industry.
I believe that in the future, Apple will continue to strengthen its supervision of the App Store and provide users with a more secure and reliable application environment.
The above is the detailed content of Apple closes 428,000 developer accounts and 282 million customer accounts to combat account fraud. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

Stay informed about the latest tech trends with these top developer newsletters! This curated list offers something for everyone, from AI enthusiasts to seasoned backend and frontend developers. Choose your favorites and save time searching for rel

CI/CD puzzles and solutions for open source software in Arm64 architecture Deploying open source software on Arm64 architecture requires a powerful CI/CD environment. However, there is a difference between the support levels of Arm64 and traditional x86 processor architectures, which are often at a disadvantage. Infrastructure components developers for multiple architectures have certain expectations for their work environment: Consistency: The tools and methods used across platforms are consistent, avoiding the need to change the development process due to the adoption of less popular platforms. Performance: The platform and support mechanism have good performance to ensure that deployment scenarios are not affected by insufficient speed when supporting multiple platforms. Test coverage: Efficiency, compliance and

Customized telecom software development is undoubtedly a considerable investment. However, in the long run, you may realize that such a project may be more cost-effective because it can increase your productivity like any ready-made solution on the market. Understand the most important advantages of building a customized telecommunications system. Get the exact features you need There are two potential problems with the off-the-shelf telecom software you can buy. Some lack useful features that can significantly improve your productivity. Sometimes you can enhance them with some external integration, but that isn't always enough to make them great. Other software has too many functions and is too complicated to use. You probably won't use some of these (never!). A large number of features usually adds to the price. Based on your needs

We have all experienced the magic of traditional automation platforms such as Zapier and IFTTT. They are good at connecting applications and automating simple "if this, then that" sequences: new form submission creates spreadsheet rows, incoming messages trigger Slack alerts. Simple, effective, and a huge time saving for basic tasks. But, how simple is your actual workflow? Once your workflow needs to understand nuanced context, gracefully handle errors, or handle unstructured data, these tools often encounter obstacles. Their simplicity makes it easy to use, but it also becomes a limitation. When simple rules are not enough: consider customer support. Unstructured data poured into ticketing systems—chat clips, screenshots, complex user drawings
