junipernetworks

Latest

  • chombosan via Getty Images

    34 major tech companies are uniting to fight cyberattacks

    by 
    Jon Fingas
    Jon Fingas
    04.17.2018

    Cyberattacks are a global issue that can cause havoc regardless of who's involved, and key members of the tech industry are uniting in a bid to fight these attacks. A group of 34 companies has signed the Cybersecurity Tech Accord, an agreement promising to defend customers around the world from hacks regardless of where they take place or who the perpetrator might be. They're promising to boost defenses for customers (including users' capacity to defend themselves), establish more partnerships to share threats and vulnerabilities, and -- importantly -- refuse to assist governments in launching cyberattacks.

  • Congress to investigate US involvement in Juniper's backdoor

    by 
    Andrew Tarantola
    Andrew Tarantola
    01.29.2016

    Congress announced plans on Friday to investigate the backdoor recently found in Juniper Networks software and whether it was intentionally placed there for the National Security Agency's benefit. The investigation is being led by the House Committee on Oversight and Government Reform, which has already sent more than two dozen letters to various agencies asking for documentation regarding their use of Juniper's ScreenOS software. The company announced in December that ScreenOS had been compromised using a technique that has widely been attributed to the NSA.

  • Juniper will release another patch for its backdoored firewalls

    by 
    Richard Lawler
    Richard Lawler
    01.09.2016

    A couple of weeks after announcing it found "unauthorized code" in firewalls that could've let someone spy on secure VPN traffic, Juniper Networks has another update on the issue. Despite the release of a patch that it says makes the firewalls secure, Juniper will go a step further with another update that swaps out the flawed Dual_EC random number generator in the affected ScreenOS software for newer technology, which will arrive in the first half of 2016. It has also completed an investigation of the source code for that product, and its newer Junos OS-powered devices, and have not found any evidence of similar code.

  • CNN: FBI is investigating the Juniper Networks security hole

    by 
    Richard Lawler
    Richard Lawler
    12.18.2015

    Yesterday's news of "unauthorized code" that could enable untraceable backdoor access to VPN traffic on certain Juniper Networks firewalls is now being investigated by the FBI. That news comes from CNN, which said that a US government official described the vulnerability as "stealing a master key to get into any government building." There's no word yet on which government agencies or private companies may have been using the specific ScreenOS-powered devices affected, but that's what the Department of Homeland Security is now trying to find out.

  • Juniper Networks finds backdoor code in its firewalls

    by 
    Richard Lawler
    Richard Lawler
    12.17.2015

    One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering "unauthorized code" in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher "The Grugq," the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.

  • The Heartbleed bug is affecting routers, too

    by 
    Sean Buckley
    Sean Buckley
    04.10.2014

    Read our Heartbleed defense primer? Good, but the fight for your privacy isn't over just yet: you might have to replace your router, too. Cisco Systems and Juniper Networks have announced that the Heartbleed bug -- a flaw in OpenSSL that lets attackers bypass common security protocols -- has been found in their networking products. This news isn't too surprising, as any device using OpenSSL is potentially vulnerable, but checking these devices for the flaw is a laborious process. Naturally, devices that don't use the affected versions of OpenSSL (like Linksys routers) are unaffected. Both firms are investigating their product libraries to compile lists of affected devices. You can find those lists here, here (for Juniper Networks) and here (for Cisco Systems). If one of your devices is listed, sit tight and watch for updates; both companies say they're working on patches.

  • Exploit uses firewalls to hijack smartphones, turns friends into foes

    by 
    Jon Fingas
    Jon Fingas
    05.22.2012

    Normally, firewalls at cellular carriers are your best friends, screening out malware before it ever touches your phone. University of Michigan computer science researchers have found that those first lines of defense could be your enemy through a new exploit. As long as a small piece of malware sits on a device, that handset can infer TCP data packet sequence numbers coming from the firewall and hijack a phone's internet traffic with phishing sites, fake messages or other rogue code. The trick works on at least 48 carriers that use firewalls from Check Point, Cisco, Juniper and other networking heavy hitters -- AT&T being one of those providers. Carriers can turn the sequences off, although there are consequences to that as well. The only surefire solution is to either run antivirus apps if you're on a mobile OS like Android or else to run a platform that doesn't allow running unsigned apps at all, like iOS or Windows Phone. Whether or not the exploit is a serious threat is still far from certain, but we'll get a better sense of the risk on May 22nd, when Z. Morley Mao and Zhiyun Qian step up to the podium at an IEEE security symposium and deliver their findings.

  • Alcatel-Lucent's FP3 network processor routes at 400Gbps, handles 70,000 simultaneous HD streams

    by 
    Darren Murph
    Darren Murph
    06.29.2011

    Looks like the world wide web is seeing a few upgrades this week. Shortly after NC State announced a new methodology for routing fiber optic connections more quickly, in flies Alcatel-Lucent with a shiny new network processor to make things even faster. The FP3 that was announced this week promises a "fourfold increase in performance over the fastest IP network available," supporting 400Gbps transmission speeds while cutting power consumption by up to 50 percent. The chip's been demonstrated to the powers that be this week, and it's reportedly designed to "address tomorrow's demand for ultra-high performance public and private IP networks." How so, you ask? A sole FP3 could handle 70,000 simultaneous HD video streams or 8.4 million simultaneous retail cloud sessions, and quite frankly, could make the 100 Gigabit Ethernet standards that were used to look like old hat. But hey -- who's kvetching about that?

  • OnLive and Juniper team up on cloud-based services for enterprise

    by 
    Donald Melanson
    Donald Melanson
    06.23.2011

    OnLive's MicroConsole may not have exactly taken the video game market by storm just yet, but it looks like the company isn't about to wait any longer to expand its cloud-based empire. Today it announced that it's partnering with Juniper Networks on what it's describing as a "no-compromise, media-rich, enterprise experience." While it's still apparently in the early stages, that solution will combine OnLive's own instant response video compression technology with Juniper Networks' Junos Pulse client, which together promise to make remotely-accessed desktops and applications "indistinguishable from a local one," regardless of the device you're accessing it on (including tablets and OnLive-enabled TVs). Unfortunately, anything much more specific than that -- including any indication of an actual rollout -- remains a bit light for the time being, but the two companies have already demoed the system at the NExTWORK Conference in New York City today, so it certainly seems like it might not be too far off.