Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

Displaying articles for: December 2013

Creating a iOS7 Application Assessment Environment

iOS7-jailbreak.pngNow that you have your shiny new Evasion7 jailbreak running it's time to set up the environment for application testing!

Happy Holidays from the Fortify Security Team (and OddTodd).

OddTodd Holiday.pngOddTodd shares some of his most interesting gifts and the one he wished he got.

What Your Binary Says About You, Part 2: I'm Not Worried About Exploits!

When an attacker analyzes your binary, you don't want it to reveal a developer who throws caution to the wind!  In the second part of our series on iOS binary protections, we'll examine settings that detect and mitigate buffer overflow attacks.

WebInspect Demo Site Update

The web site used by the WebInspect product to demonstrate its functionality and effectiveness was significantly upgraded earlier this year.  The new version of was developed to allow WebInspect to showcase its enhanced capabilities against a website that more closely imitates the atmosphere of the modern web.

Insecure Data Storage – What your phone might be saying about you

phone-password-300x199.jpgYou’ve picked up the latest greatest model of your favorite iPhone ™, Android ™  or Windows ™  phone with all of the latest features. You’ve set the screen lock with a good PIN (not 5555 like the last time). Now your data is secure and you have nothing to worry about, right?

Bitcoins, just one part of the new Hacker Economy - Part II

In Part I of this post, I discussed a number of common targets for today's cyber criminal: Bitcoins, mobile devices, credit cards and personal data. In this final post, I'll present a few more typical theft scenarios and finish by offering a few pointers you can use to minimize your chances of becoming an unwitting victim.

Bitcoins, just one part of the new Hacker Economy - Part I

The New Hacker Economy

Gone are the days of hacker motivation composed purely of recognition and bragging rights. Today's hackers are motivated by profit.  Whether this is due to their growing up, increased opportunity or other factors, the landscape is clear: opportunities for malicious actors to cash in abound and they are taking full advantage, at all of our expense.


In this post, I'll discuss some of today's hackers primary targets, what they commonly steal, and how they cash in.

Make Mobile App Security a priority. It's Chaos Out There!

Insecure mobile applications represent a real security threat to enterprises and individuals.  Do you trust your mobile applications? 



Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.