Connect with us

Tech

Over 540,000 apps wiped from Apple App Store in Q3 reaching lowest number in 7 years

Published

on

The App Store remains a crucial segment in Apple’s (NASDAQ: AAPL) business line; hence the number of applications on the platform has emerged as a critical metric to track. Over the years, the apps on the App Store have fluctuated marginally, but the recent quarter highlights an accelerated drop in apps. 

In particular, according to data acquired by Finbold, the number of apps in the Apple App Store hit a seven-year low during 2022 Q3 to stand at 1,642,759. The value represents a drop of 541,697 or 24.79% from the 2,184,456 registered during Q2 2022. The last time the number of apps was this low was during Q3 2015 at 1,672,271.

Elsewhere, regarding the number of apps on leading app stores globally as of Q3 2022, Google Play Store ranks top at 3,553,050 while App Store ranks second at 1,642,759. Amazon (NASDAQ: AMZN) Appstore has the third highest number of applications at 483,328. 

Policy changes trigger a drop in App Store apps 

It is worth noting that removing apps from the App Store is a perennial practice initiated by Apple as part of maintaining quality on the platform. However, the recent spike in removed apps can be attributed to several decisions by the company to improve user experience. 

In this case, in April 2022, the company notified developers that it was rolling out a plan to remove old apps that had not been updated for some time. The directive saw developers directed to make updates within 30 days or risk removal from the platform. 

Previously, Apple had not set any timeline for removing apps, but the recent update stressed that cleaning the App Store is an ongoing process and will evaluate apps, removing apps that no longer function as planned, don’t adhere to reviewed guidelines, or need to be updated.

Notably, the policy has received a lot of criticism, with developers arguing that the old apps should continue to exist on the platform as long as they are still functional. For instance, gaming developers maintain that the apps should be treated as old video games that remain playable on consoles.

At the same time, in recent months, the App Store has become a center of controversy with reported scams and fraudulent applications existing on the platform. In this case, the company resorted to removing virus-scanning apps, app clones, and other low-quality apps cluttering the App Store, with Apple maintaining that the App Store offers a safe experience for users. 

Overall, removing apps aligns with Apple’s long-standing policy of curating the App Store to eliminate apps that routinely fail to adhere to set standards. 

App Store drop in revenue

Interestingly, the drop in the number of apps has also correlated with a period in which the App Store registered one of the significant declines in revenues during 2022 Q3. Notably, the revenue plunge was also witnessed from the gaming apps that are crucial to the store’s financial performance.

In the meantime, Apple continues to explore the App Store as a possible strategic source of revenue through some decisions that have been deemed unpopular, like increasing app purchases, in-app purchases, and subscriptions from the App Store.

Elsewhere, the App Store trails the Google Play Store in the number of applications driven by factors like a larger Android market than iOS devices. Also, developing Android apps is cheaper since developers do not need significant resources. At the same time, approval for publishing apps on the Play Store is less cumbersome.

App Store future outlook  

At the same time, the outlook of the App Store is likely to be impacted in the future, especially with regulators increasingly cracking down on the company’s market dominance. This is highlighted by a recent European antitrust law that aims to allow users to install software applications from third parties.

In general, the number of apps removed from the App Store will likely increase, especially with the company targeting specific sectors. For instance, Apple recently clarified its rules for apps affecting cryptocurrencies and non-fungible tokens (NFTs). For crypto exchanges, Apple’s policy indicates that the apps may facilitate transactions or transmissions of cryptocurrency on a regulated exchange. However, such apps can only be offered in regions with licensing and permission to operate a business.

The post Over 540,000 apps wiped from Apple App Store in Q3 reaching lowest number in 7 years appeared first on Finbold.

Crypto Chain Wire specifically designed for crypto, NFT, DeFi and all other blockchain companies to provide them instant and effortless crypto news syndication services. CryptoChainWire is the best PR syndication platform for any blockchain startup looking to gain maximum media attention. Visit Us : https://www.cryptochainwire.com/ Contact Us: contact@cryptochainwire.com

Continue Reading

Tech

The DarkSword exploit on iOS 18 compromises cryptocurrency wallets across six platforms

Published

on

Google researchers have detected the DarkSword exploit on iOS 18 devices affecting versions 18.4 through 18.7, according to the Google Threat Intelligence report. This exploit chain utilizes six critical vulnerabilities to inject the Ghostblade malware, which extracts sensitive data from six exchange platforms and multiple digital wallets without leaving any apparent trace.

The intrusion chain is activated when users access compromised web portals that execute arbitrary code in the background. This silent process leverages flaws in the system’s rendering engine to install malicious components without requiring direct interaction from the owner of the affected device. The sophistication of DarkSword demonstrates a level of engineering previously reserved for government-level espionage operations.

Mobile espionage reaches critical levels of technical precision

Once inside the Apple environment, the Ghostblade component scans the system for centralized exchange applications such as Binance and Kraken. The objective is to capture login credentials and session tokens that allow total control over the user’s funds. This surgical approach minimizes system alerts, allowing the data extraction to occur within a matter of seconds.

The danger extends to self-custody solutions, including cold and hot wallets such as MetaMask, Ledger, and Phantom. By intercepting seed phrases and private keys during transaction processes, the malware nullifies the inherent security of physical storage for digital assets. The vulnerability puts the financial integrity of both retail and institutional investors at significant risk today.

Beyond financial data, the exploit extracts personal metadata including call logs, Wi-Fi passwords, and browsing cookies. This massive exfiltration capability allows for much more effective subsequent social engineering attacks against the victim. The collection of health and location data adds an extremely intrusive dimension of personal surveillance for any mobile user.

How does DarkSword alter the security paradigm for mobile devices?

From a technical perspective, Ghostblade introduces a tactical innovation based on the volatility of its files within the internal storage. After completing the data transfer to external command centers, the program automatically deletes its traces to avoid detection by mobile security tools. This ephemeral behavior makes it extremely difficult to create effective detection signatures at this time.

The geographic distribution of the campaign suggests advanced coordination, affecting critical infrastructure in nations such as Ukraine and Saudi Arabia. In these cases, the impersonation of legitimate government portals to spread the virus among the civilian population has been observed. This “watering hole” tactic maximizes the infection rate by abusing pre-existing institutional trust.

Historically, the blockchain sector has been the target of massive attacks such as the one recorded by Inferno Drainer, which stole nine million dollars. However, DarkSword represents a superior threat by acting directly on the operating system, differing from conventional phishing scams. The scale of this new risk demands a complete re-evaluation of security protocols.

To mitigate these risks, it is imperative that Apple device users install the latest security patches immediately. Reliance on SMS-based two-factor authentication should be reduced, opting instead for physical security keys or independent authentication apps. It is vital to prevent intrusions via software from unverified sources to maintain financial sovereignty.

The future of mobile security will depend on the manufacturers’ ability to close zero-day gaps before their exploitation. Meanwhile, constant monitoring of data flows and the use of isolated environments for cryptographic transactions are recommended measures. The industry must prepare for a new era of persistent threats that challenge the closed architecture of iOS continuously.

The post The DarkSword exploit on iOS 18 compromises cryptocurrency wallets across six platforms appeared first on The Cryptocurrency Post.

Continue Reading

Tech

qLABS takes the lead in quantum security amid growing pressure for crypto companies

Published

on

The advancement of quantum computing has ceased to be an academic theory to become an imminent threat that companies must face. In this context, qLABS, a foundation specialized in cryptographic infrastructure, has announced the launch of its qONE token and its Quantum-Sig wallet to protect digital assets.

This initiative arises at a critical moment where elliptic curve signature systems, essential for the security of networks like Ethereum or Solana, could become vulnerable to powerful quantum machines. However, qLABS proposes an immediate resistance layer, avoiding the wait for slow structural updates in the main blockchains.

Technical innovation to neutralize the risk of future decryption

Unlike other projects that seek to rebuild networks from scratch, qLABS’ proposal is based on implementing a post-quantum security layer over already existing infrastructures. Its system uses a dual-signature technology, which requires both the classical signature and a second signature resistant to quantum attacks to validate any transaction.

This approach seeks to mitigate the danger known as “harvest now, decrypt later,” a strategy where malicious actors collect data today to compromise private keys when quantum technology matures. Furthermore, the qONE token presale, scheduled for February 5, will mark a milestone in the commercialization of services of advanced security.

How do the giants of the sector plan to respond to this technological challenge?

While qLABS deploys tangible solutions, other large-scale companies like Coinbase have opted to strengthen their research frameworks through independent advisory committees. Despite these corporate efforts, the agility of quantum-native protocols is raising the protection standards demanded by global investors and developers.

On the other hand, networks like Aptos have already proposed signature schemes based on NIST standards, demonstrating that the transition toward post-quantum cryptography is a strategic priority. Thus, the market observes how competition shifts from scalability toward long-term resilience against disruptive computational capabilities.

The adoption of these tools will define the survival of assets in the next decade, especially as estimates for the arrival of “Q-Day” shorten significantly. Therefore, the cryptocurrency ecosystem is in a preventive migration phase, where success will depend on implementing robust defenses before the threat becomes an inevitable technical reality.

The post qLABS takes the lead in quantum security amid growing pressure for crypto companies appeared first on The Cryptocurrency Post.

Continue Reading

Tech

Decentralized GPU Computing Networks Dominate AI Inference Within the 2026 Market

Published

on

The artificial intelligence landscape has undergone a profound structural transformation during the beginning of this year, shifting the focus from massive training to the efficient execution of models. While hyperscale data centers maintain their hegemony in frontier model development, decentralized GPU computing has established itself as the essential layer for inference and everyday production tasks.

According to Mitch Liu, co-founder of Theta Network, the optimization of open-source models allows them to run with astonishing efficiency on consumer-grade hardware. This trend has allowed 70% of global processing demand to shift toward inference and autonomous agents, transforming compute into a scalable and continuous utility service for companies of all sizes and industries.

A Paradigm Shift: From Skyscraper Construction to Distributed Utility

The industrial analogy is clear: if training a frontier model is like building a skyscraper that requires millimeter-level coordination, inference is more akin to the distribution of basic services. In this context, decentralized networks take advantage of variable latency and geographical dispersion, offering a low-cost alternative to the monopolies of traditional cloud providers.

On the other hand, hyperscale infrastructure remains indispensable for large-scale projects, such as the training of Llama 4 or GPT-5, which demand clusters of hundreds of thousands of Nvidia cards. However, for blockchain and consumer applications, the ability to process data close to the end-user represents an insurmountable competitive advantage in terms of response speed and efficiency.

Furthermore, the flexibility of these networks allows for handling elastic demand waves without the rigid contracts of tech giants. By using idle gaming-grade hardware, decentralized platforms manage to drastically reduce the operating costs of AI startups, allowing innovation to not depend exclusively on multi-million dollar budgets or privileged access to hardware supplies.

Why Is Inference the New Battlefield for Distributed Networks?

Unlike training, which requires constant synchronization between machines, inference allows workloads to be split and executed independently. This technical feature is what allows decentralized GPU computing to shine, as the global dispersion of nodes minimizes network hops and reduces latency for users in remote or underserved regions.

In addition, sectors such as drug discovery, video generation, and large-scale data processing find this model to be an ideal solution. In this way, tasks requiring open web access and parallel processing can be executed without proxy restrictions, facilitating a much more democratic and accessible development ecosystem for the global community of researchers and developers.

Looking ahead, the coexistence between centralized data centers and distributed networks is expected to normalize under a hybrid model. The success of this transition will depend on the networks’ ability to maintain compute integrity, ensuring that decentralization does not compromise the accuracy of the results generated by today’s most advanced artificial intelligence models.

The post Decentralized GPU Computing Networks Dominate AI Inference Within the 2026 Market appeared first on The Cryptocurrency Post.

Continue Reading

Trending