Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Juniper Networks expands its portfolio of US Department of Defense certified devices.


What ransomware does to animals..What ransomware does to animals..

Can ransomware attack cloud data? Are you safe if you use online backups or backup services like Dropbox or Google Drive?  It depends...


Web application vulnerabilities face exploitation by malicious attackers, who are looking for benefits from the activity. Secure network architectures need to constantly evolve to keep up with the latest advanced persistent threats.


OWASP represents most critical application vulnerabilities and provides excellent reference point for assessing the application security risks.


The World Wide Web is a source of threats in the form of malware and viruses. There are hackers trying to get in to corporates network and steal information. This makes it important for businesses to have a complete visibility of the usage patterns of the applications over the Internet accessed by their users. This visibility can help organization detect and block malicious or unauthorized network traffic.


Welcome to the June edition of Microsoft Patch Tuesday Summary. In this edition there are 16 updates; 5 are marked "Critical" and 11 are rated "Important".  A total of 36 CVE's (Common Vulnerability and Exposure) were fixed over 16 bulletins this month. One of the Critical update MS16-063 is a Internet Explorer (IE 9 to 11) patch. This single update resolves 7 CVE's (Common Vulnerability and Exposure) and is the highest profile bulletin of the month.



The current situation with malware naming conventions is in disarray. Different antivirus vendors use different naming conventions and sometimes they don’t follow their own standards.  Let's come up with a better way to name viruses.


Economics of Botnets

by Juniper Employee on ‎06-02-2016 12:51 PM



According to recent security reports, botnets have become an increasing security concern, infecting tens of millions of computers, stealing users’ data, identities and helping to mount DDoS attacks. In fact, it has been estimated that up to a quarter of all personal computers participate in a botnet.


More on Ransomware

by Juniper Employee ‎05-20-2016 05:10 PM - edited ‎05-23-2016 04:06 PM


2016 is shaping up to be the year of ransomware. In addition to Locky, we’ve seen TeslaCrypt, 7ev3n, 7ev3n-HONE$T, a failed Locky clone, Petya, Rokku, Jigsaw, and many more. Hospitals and medical centers have been hit by ransomware, including the SamSam variant that targets vulnerable JBoss servers. In this post, we’ll look at some recent ransomware samples and how Sky ATP handles these threats.


“Indistinguishability Obfuscation” And Malware Detection

by Juniper Employee ‎05-20-2016 12:24 AM - edited ‎05-20-2016 12:25 AM



Recent breakthroughs in cryptography, widely reported on in the media showed that it is possible to reassemble any given program into a mathematical jigsaw puzzle so complicated that, although it functions identically to the original, divining its purpose without running it is effectively impossible. We’ll look at the security implications of these findings.


Static analysis methods and signature-based detection in particular has been the bread and butter strategy for malware detection, because it allows for quick and painless detection and virus identification. Let's talk about how signature-based detection works.



Making FinFisher Spyware Undetectable

by Juniper Employee ‎05-17-2016 09:46 AM - edited ‎05-17-2016 10:29 AM

Governments use malware to spy on journalists.  In this article we will show how to make one such malware undetectable by antivirus programs.


May 2016 Microsoft Patch Tuesday Summary

by Juniper Employee ‎05-10-2016 08:26 PM - edited ‎05-10-2016 08:29 PM

Welcome to the May edition of Microsoft Patch Tuesday Summary. In this edition there are 15 updates; 7 are marked "Critical" and 8 are rated "Important".  A total of 36 CVE's (Common Vulnerability and Exposure) were fixed over 15 bulletins this month. One of the Critical update MS16-051 is an Internet Explorer (IE 9 to 11) patch. This single update resolves 5 CVE's (Common Vulnerability and Exposure).


We often speak of the Internet of Things as if it was one thing.  It is, of course, not.  It is arguably one of the most diverse spaces that technology has yet created.  There are many standards and technologies addressing the challenges of this new space.


Software Defined Secure Networks (SDSN): Why do we need them?

by Juniper Employee ‎04-29-2016 05:11 PM - edited ‎05-09-2016 09:22 PM

At this year’s RSA event Juniper announced, “software defined secure networks” (SDSN). It has been the topic of discussion with customers and partners to make them think of security in a completely different way. This blog focuses on a new way of deploying security across the entire organization and cloud assets.




About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe


Design and Architecture Center