Do you code from written security requirements? Do you write Secure Code? Does your test phase include security testing? How tempting is your application for hackers?
Hackers are a different breed in many ways, not the least of which is determination. They also understand how to 'energize' themselves for the task at hand, as the picture below illustrates.
Here's an interesting read - the story of hacking the IPhone.
Finding JTAG on the iPhone: Postmortem