Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Web application vulnerabilities face exploitation by malicious attackers, who are looking for benefits from the activity. Secure network architectures need to constantly evolve to keep up with the latest advanced persistent threats.

 

OWASP represents most critical application vulnerabilities and provides excellent reference point for assessing the application security risks.

Read more...

The World Wide Web is a source of threats in the form of malware and viruses. There are hackers trying to get in to corporates network and steal information. This makes it important for businesses to have a complete visibility of the usage patterns of the applications over the Internet accessed by their users. This visibility can help organization detect and block malicious or unauthorized network traffic.

Read more...

Welcome to the June edition of Microsoft Patch Tuesday Summary. In this edition there are 16 updates; 5 are marked "Critical" and 11 are rated "Important".  A total of 36 CVE's (Common Vulnerability and Exposure) were fixed over 16 bulletins this month. One of the Critical update MS16-063 is a Internet Explorer (IE 9 to 11) patch. This single update resolves 7 CVE's (Common Vulnerability and Exposure) and is the highest profile bulletin of the month.

Read more...

virus_names.png

The current situation with malware naming conventions is in disarray. Different antivirus vendors use different naming conventions and sometimes they don’t follow their own standards.  Let's come up with a better way to name viruses.

Read more...

Economics of Botnets

by Juniper Employee on ‎06-02-2016 12:51 PM

title_img.jpg

 

According to recent security reports, botnets have become an increasing security concern, infecting tens of millions of computers, stealing users’ data, identities and helping to mount DDoS attacks. In fact, it has been estimated that up to a quarter of all personal computers participate in a botnet.

Read more...

More on Ransomware

by Juniper Employee ‎05-20-2016 05:10 PM - edited ‎05-23-2016 04:06 PM

mischa_animated.gif

2016 is shaping up to be the year of ransomware. In addition to Locky, we’ve seen TeslaCrypt, 7ev3n, 7ev3n-HONE$T, a failed Locky clone, Petya, Rokku, Jigsaw, and many more. Hospitals and medical centers have been hit by ransomware, including the SamSam variant that targets vulnerable JBoss servers. In this post, we’ll look at some recent ransomware samples and how Sky ATP handles these threats.

Read more...

“Indistinguishability Obfuscation” And Malware Detection

by Juniper Employee ‎05-20-2016 12:24 AM - edited ‎05-20-2016 12:25 AM

random.png

 

Recent breakthroughs in cryptography, widely reported on in the media showed that it is possible to reassemble any given program into a mathematical jigsaw puzzle so complicated that, although it functions identically to the original, divining its purpose without running it is effectively impossible. We’ll look at the security implications of these findings.

Read more...

Static analysis methods and signature-based detection in particular has been the bread and butter strategy for malware detection, because it allows for quick and painless detection and virus identification. Let's talk about how signature-based detection works.

 

Read more...

Making FinFisher Spyware Undetectable

by Juniper Employee ‎05-17-2016 09:46 AM - edited ‎05-17-2016 10:29 AM

Governments use malware to spy on journalists.  In this article we will show how to make one such malware undetectable by antivirus programs.

Read more...

May 2016 Microsoft Patch Tuesday Summary

by Juniper Employee ‎05-10-2016 08:26 PM - edited ‎05-10-2016 08:29 PM

Welcome to the May edition of Microsoft Patch Tuesday Summary. In this edition there are 15 updates; 7 are marked "Critical" and 8 are rated "Important".  A total of 36 CVE's (Common Vulnerability and Exposure) were fixed over 15 bulletins this month. One of the Critical update MS16-051 is an Internet Explorer (IE 9 to 11) patch. This single update resolves 5 CVE's (Common Vulnerability and Exposure).

Read more...

We often speak of the Internet of Things as if it was one thing.  It is, of course, not.  It is arguably one of the most diverse spaces that technology has yet created.  There are many standards and technologies addressing the challenges of this new space.

Read more...

Software Defined Secure Networks (SDSN): Why do we need them?

by Juniper Employee ‎04-29-2016 05:11 PM - edited ‎05-09-2016 09:22 PM

At this year’s RSA event Juniper announced, “software defined secure networks” (SDSN). It has been the topic of discussion with customers and partners to make them think of security in a completely different way. This blog focuses on a new way of deploying security across the entire organization and cloud assets.

 

 

Read more...

Juniper Sky Advanced Threat Prevention vs. Locky Malware

by Juniper Employee ‎04-14-2016 02:00 PM - edited ‎04-15-2016 01:24 PM

“Locky” is a new strain of ransomware malware that emerged on February 16th of this year. Ransomware is a type of malware that infects a computer and blocks access to the computer or files on the computer in some way. The most common ransomware technique is encrypting documents and other important files so the content of the files is inaccessible until a ransom is paid, typically using Bitcoin as the method of payment. With Locky, the payoff was 0.5 or 1 BTC for most people (about $200 to $400 USD).

 

The “Locky” name was given to this malware because it renames all of those encrypted files with a “.locky” extension.

 

Read more...

Guy bought a new refrigerator; a smart one.  In addition to keeping the milk from going bad, it tracks inventory, the habits of the household, and reports this data back to its home base.  Of course, this is not the only Internet connected device Guy’s household owns; thermostats, security cameras, motion detectors, light controls, locks, and on and on.  When Guy sells his house, he will go around decommissioning all these devices; disabling, reconfiguring, dismembering them.  But then, how is the new owner going to get into the house and turn on the lights?  It is a new world. 

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements

Network Design and Architecture Center
Labels