Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Juniper Networks Opens Mobile Threat Center

Juniper’s Global Threat Center Will Focus Exclusively on Mobile Threats

Juniper Networks this week announced the opening of the Juniper Global Threat Center in Columbus, Ohio to provide around-the-clock, global monitoring of mobile security threats to consumers and enterprises.

Juniper’s Global Threat Center Will Focus Exclusively on Mobile Threats

Juniper Networks this week announced the opening of the Juniper Global Threat Center in Columbus, Ohio to provide around-the-clock, global monitoring of mobile security threats to consumers and enterprises.

Juniper Networks Logo

An evolution of the Threat Center that was operating under SMobile Systems, which Juniper acquired in July, the facility is dedicated to tracking, responding and researching threats to mobile devices, including viruses, spyware and other security vulnerabilities that can expose a user’s personal, professional and sensitive information.

Mobile devices have become an effortless way of connecting into corporate networks regardless of location. Yet, just as easily, they expose corporations to malware, exploits and loss and theft, which pose significant dangers to today’s global mobile workforce.

According to a recent study conducted by Juniper Networks, nearly 80 percent of users access their employer’s network without their employer’s knowledge or permission and 59 percent do so every day. Consumers are no better off — they use smartphones for mobile banking and storing personal information such as bank account numbers and passwords, placing sensitive data at risk of falling into the wrong hands.

In the first half of 2011, the Juniper Global Threat Center will release the “State of Mobile Security 2010 Report,” a report that analyzes the state of mobile security. Preliminary findings to date include:

• Analysis of Android Market applications capable of malicious activity showed that 1 out of every 20 applications requested permissions that could allow the application to place a call without the user’s knowledge.

• A 250 percent increase in malware from 2009 to 2010

Advertisement. Scroll to continue reading.

• A Fortune 15 company found that 5 percent or 25,000 of its mobile devices were infected with malware.

• 61 percent of all reported smartphone infections were spyware, capable of monitoring communication from the device.

• 17 percent of all reported infections were text message Trojans, which charge fees to a device’s account holder.

“People are using smartphones to access work files, store personal information, conduct banking and download applications,” said Daniel V. Hoffman, chief mobile security evangelist at Juniper Networks. “Yet, while most PCs come with security baked-in, virtually all smartphones remain vulnerable to even basic exploits and attacks.”

The research conducted by the Juniper Global Threat Center is shared with the public and private industry, as well as incorporated into the features and functionality of new and existing products, such as the Junos Pulse Mobile Security Suite announced this week.

The Juniper Global Threat Center’s primary focus is to monitor and respond to five key types of threats and vulnerabilities:

• Malware – Viruses, Worms, Trojans, Spyware

• Direct Attack – Attacking device interfaces, browser exploits, SMS attacks

• Physical Compromise – Accessing a device and its data by having physical access from loss or theft

• Data Communication Interception – Intercepting data as it is transmitted and received

• Exploitation and Misconduct – Inappropriate communications, data leakage, online predators, bullying, sexting

According to market research from Infonetics Rsearch, the mobile security client software segment is forecast to grow at a 50% compound annual growth rate (CAGR) from 2009 to 2014.

Be Informed. Subscribe to the SecurityWeek Email Briefing Here >

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.