Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Fortify on Demand Mobile releases the HP Mobile Application Security Vulnerability Report

markpainter ‎11-19-2013 07:20 AM - edited ‎01-21-2016 12:55 PM

smartphone-money-ff.jpgFifteen years ago, organizations without a web presence ran the risk of falling hopelessly behind their competitors. In banking and retail, the pressure to conduct business via the web was even more keenly felt. Now, the same holds true for organizations without mobile applications. And just as with their web counterparts, the understandable pressure for organizations to release mobile applications as quickly as possible too often sees security concerns left unaddressed.


HP Fortify on Demand Mobile examined more than 2,000 mobile applications from more than 600 companies to ascertain the true current state of mobile application security. The data revealed alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.  An astounding 9 in 10 of the mobile applications we tested revealed some form of serious vulnerability. 97% of the applications tested inappropriately accessed private information sources within a device. Another 86% of the apps tested lacked the means to protect themselves from common exploits, such as misuse of encrypted data, cross-site scripting and insecure transmission of data.


For more information regarding these findings, view the report. There you can learn:


  • What vulnerabilities plague mobile applications
  • What mistakes mobile application developers most often make
  • The steps organizations can immediately take to protect their mobile data

And be sure to watch the video to see if you can spot the four mobile vulnerabilities!


About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
February 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all