The HP Security Research Cyber Risk Report 2013 examines specific areas of the attack surface—the sum of the people, processes and technologies that leave you vulnerable to attack. It details the most common types of vulnerabilities—including those in open source, web and mobile apps—and how hackers typically exploit them.
Some of the findings are alarming. For example:
- 56% of the applications tested exhibited weaknesses to revealing information about the application, its implementation or its users.
- 74% of apps exhibit unnecessary permissions.
- 80% of applications are vulnerable to misconfiguration vulnerabilities.
- Hybrid development frameworks for mobile apps don’t address many well-known security issues.
Download the complete report to understand the details, read the comprehensive South Korean targeted attack case study and see recommendations and best practices.