Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Malware & Threats

Juniper Networks Opens Mobile Threat Center

Juniper’s Global Threat Center Will Focus Exclusively on Mobile Threats

Juniper Networks this week announced the opening of the Juniper Global Threat Center in Columbus, Ohio to provide around-the-clock, global monitoring of mobile security threats to consumers and enterprises.

Juniper’s Global Threat Center Will Focus Exclusively on Mobile Threats

Juniper Networks this week announced the opening of the Juniper Global Threat Center in Columbus, Ohio to provide around-the-clock, global monitoring of mobile security threats to consumers and enterprises.

Juniper Networks Logo

An evolution of the Threat Center that was operating under SMobile Systems, which Juniper acquired in July, the facility is dedicated to tracking, responding and researching threats to mobile devices, including viruses, spyware and other security vulnerabilities that can expose a user’s personal, professional and sensitive information.

Mobile devices have become an effortless way of connecting into corporate networks regardless of location. Yet, just as easily, they expose corporations to malware, exploits and loss and theft, which pose significant dangers to today’s global mobile workforce.

According to a recent study conducted by Juniper Networks, nearly 80 percent of users access their employer’s network without their employer’s knowledge or permission and 59 percent do so every day. Consumers are no better off — they use smartphones for mobile banking and storing personal information such as bank account numbers and passwords, placing sensitive data at risk of falling into the wrong hands.

In the first half of 2011, the Juniper Global Threat Center will release the “State of Mobile Security 2010 Report,” a report that analyzes the state of mobile security. Preliminary findings to date include:

• Analysis of Android Market applications capable of malicious activity showed that 1 out of every 20 applications requested permissions that could allow the application to place a call without the user’s knowledge.

Advertisement. Scroll to continue reading.

• A 250 percent increase in malware from 2009 to 2010

• A Fortune 15 company found that 5 percent or 25,000 of its mobile devices were infected with malware.

• 61 percent of all reported smartphone infections were spyware, capable of monitoring communication from the device.

• 17 percent of all reported infections were text message Trojans, which charge fees to a device’s account holder.

“People are using smartphones to access work files, store personal information, conduct banking and download applications,” said Daniel V. Hoffman, chief mobile security evangelist at Juniper Networks. “Yet, while most PCs come with security baked-in, virtually all smartphones remain vulnerable to even basic exploits and attacks.”

The research conducted by the Juniper Global Threat Center is shared with the public and private industry, as well as incorporated into the features and functionality of new and existing products, such as the Junos Pulse Mobile Security Suite announced this week.

The Juniper Global Threat Center’s primary focus is to monitor and respond to five key types of threats and vulnerabilities:

• Malware – Viruses, Worms, Trojans, Spyware

• Direct Attack – Attacking device interfaces, browser exploits, SMS attacks

• Physical Compromise – Accessing a device and its data by having physical access from loss or theft

• Data Communication Interception – Intercepting data as it is transmitted and received

• Exploitation and Misconduct – Inappropriate communications, data leakage, online predators, bullying, sexting

According to market research from Infonetics Rsearch, the mobile security client software segment is forecast to grow at a 50% compound annual growth rate (CAGR) from 2009 to 2014.

Be Informed. Subscribe to the SecurityWeek Email Briefing Here >

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.