SUNNYVALE, CA–(Marketwire – Feb 15, 2012) – Juniper Networks (NASDAQ:JNPR, news, filings) released findings today from its 2011 Mobile Threats Report, showing that mobile malware has reached a new stage of maturation. The report, conducted by the Juniper Networks Mobile Threat Center — the only threat center in the world devoted exclusively to mobile security research — is one of the largest first-hand quantitative research studies of its kind.
Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating attacks on mobile devices:
1. There is more malware than ever before. 2011 saw a record number of mobile malware attacks — particularly to the Google Android platform.
2. Mobile malware has gotten smarter. Cybercriminals continue to hone their craft by finding new ways to exploit vulnerabilities and human behavior for profit across all mobile platforms and devices.
3. The barrier to entry is low. Data shows an evolution from sophisticated, complex and deep technical attacks to schemes that are lightweight, social and able to deliver fast profits. As mobile users download more applications than ever before, applications themselves are becoming the “killer app” for hackers and the most popular way to compromise devices.
Click to Tweet: @JuniperNetworks Global Research Shows Mobile Malware Accelerating http://bit.ly/JNPRnewz
The Juniper Networks Mobile Threat Center examined more than 790,000 applications and vulnerabilities across every major mobile device operating system to inform its 2011 Mobile Threats Report.
Additional Key Findings Include:
- From 2010 to 2011, the Juniper Networks Mobile Threat Center identified a 155 percent increase in mobile malware across all mobile device platforms.
- In the last seven months of 2011 alone, malware targeting the Android platform jumped 3,325 percent.
- In 2011, spyware and SMS Trojans comprised the vast majority of malware targeting mobile devices, at 63 percent and 36 percent respectively.
- Research into Apple iOS security remains limited given the closed nature of its platform; but in 2011, security researchers were successful in getting an unapproved application onto the Apple App Store.
- A new attack method dubbed “Fake Installers” was the fastest growing type of malware found in 2011. Fake Installers trick victims into unknowingly paying for pirated versions of popular applications that are normally free.
- In addition to the rising threat of malware, consumers and enterprises remain susceptible to a very low-tech risk: lost or stolen mobile devices. In the last year alone, nearly one in five users of JunosĀ® Pulse Mobile Security Suite — Juniper’s comprehensive mobile device security and management solution — required a locate command to identify the whereabouts of a mobile device.
Supporting Quotes:
“The rapid growth in mobile malware combined with ongoing concerns about lost and stolen devices illustrate just how important of an issue mobile security is — and that it is an issue that affects everyone, not just corporations. At Juniper, we believe building trust in mobility is just as important as building great networks and powerful applications.”
-Dan Hoffman, chief mobile security evangelist, Juniper Networks
“It is vital that consumers and businesses take the necessary security precautions when using mobile devices. Securing mobile devices requires a combination of safeguarding connections from interception, securing data in transit from prying eyes or theft, protecting against fast-propagating malware, possessing the tools to manage devices and apps, and securing the data, usernames and passwords on them in the event that they are lost or stolen.”
-Sanjay Beri, vice president and general manager, Junos Pulse Business Unit, Juniper Networks
Additional Resources:
- Video: About the Juniper Networks 2011 Mobile Threats Report
- Video: How to Protect Your Mobile Life
- Infographic and Blog Post: Juniper Mobile Security Report 2011 — Unprecedented Mobile Threat Growth
- Blog Post: The Security Focus on Android: Fair or Unfair?
- Blog Post: Protecting Corporate and Personal Information From New Attacks on Mobile Devices
- Juniper on Twitter
- Juniper on Facebook
- Information on Juniper Networks Junos Pulse Mobile Security Suite
The Juniper Networks Mobile Threat Center is based out of Juniper’s Mobile Center of Excellence located in Columbus, OH. For more information on the 2011 Mobile Threats Report, visit www.juniper.net/security.
About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net).
Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
PR Archives: Latest, By Company, By Date