Fortify on Demand Mobile releases the HP Mobile Application Security Vulnerability Report

smartphone-money-ff.jpgFifteen years ago, organizations without a web presence ran the risk of falling hopelessly behind their competitors. In banking and retail, the pressure to conduct business via the web was even more keenly felt. Now, the same holds true for organizations without mobile applications. And just as with their web counterparts, the understandable pressure for organizations to release mobile applications as quickly as possible too often sees security concerns left unaddressed.

 

HP Fortify on Demand Mobile examined more than 2,000 mobile applications from more than 600 companies to ascertain the true current state of mobile application security. The data revealed alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.  An astounding 9 in 10 of the mobile applications we tested revealed some form of serious vulnerability. 97% of the applications tested inappropriately accessed private information sources within a device. Another 86% of the apps tested lacked the means to protect themselves from common exploits, such as misuse of encrypted data, cross-site scripting and insecure transmission of data.

 

For more information regarding these findings, visit  http://hpsw.co/e9ELd3n. There you can learn:

 

  • What vulnerabilities plague mobile applications
  • What mistakes mobile application developers most often make
  • The steps organizations can immediately take to protect their mobile data

And be sure to watch the video to see if you can spot the four mobile vulnerabilities!

 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.