Breaking News

G.SKILL Demo New Memory Solutions for Gaming, Server, AI, Workstation Applications at Computex 2026 LIAN LI Launches HydroShift II OLED Curved 360 AIO LIAN LI Unveils O11 VISION-M CORSAIR PRO launches AI Workstations and Servers ASUS Announces T1 GeForce RTX 5070 and RTX 5060 Ti Graphics Cards

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Juniper Networks To Remove Spying Code From Its Software

Juniper Networks To Remove Spying Code From Its Software

Enterprise & IT Jan 9,2016 0

Juniper Networks said on Friday it would stop using a piece of security code that analysts believe was developed by the National Security Agency in order to eavesdrop through technology products. The company has released critical patched releases to address vulnerabilities in devices running ScreenOS software. During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections.

In addition to removing the unauthorized code and making patched releases available, Juniper undertook an investigation of ScreenOS and Junos OS source code.

Juniper said it was continuing to investigate.

The Silicon Valley maker of networking gear said it would ship new versions of security software in the first half of this year to replace those that rely on numbers generated by Dual Elliptic Curve technology.

Earlier this week, a team of cryptographers announced at a Stanford University conference that Juniper's code had been changed in multiple ways during 2008 to enable eavesdropping on virtual private network sessions by customers.

Until now, the most influential adopter of Dual Elliptic Curve was believed to be RSA, part of storage company EMC.

Though the academic team looking at Juniper has not named a suspect in the 2008, 2012 or 2014 changes, 2008 was one year after veteran cryptographers raised questions about Dual Elliptic Curve.

Tags:
Previous Post
Xiaomi Redmi 3 To Launch In China
Next Post
Home Entertainment Spending Was Increased in 2015: DEG

Related Posts

Latest News

G.SKILL Demo New Memory Solutions for Gaming, Server, AI, Workstation Applications at Computex 2026
PC components

G.SKILL Demo New Memory Solutions for Gaming, Server, AI, Workstation Applications at Computex 2026

LIAN LI Launches HydroShift II OLED Curved 360 AIO
Cooling Systems

LIAN LI Launches HydroShift II OLED Curved 360 AIO

LIAN LI Unveils O11 VISION-M
Cooling Systems

LIAN LI Unveils O11 VISION-M

CORSAIR PRO launches AI Workstations and Servers
Cooling Systems

CORSAIR PRO launches AI Workstations and Servers

ASUS Announces T1 GeForce RTX 5070 and RTX 5060 Ti Graphics Cards
GPUs

ASUS Announces T1 GeForce RTX 5070 and RTX 5060 Ti Graphics Cards

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Endorfy Thock V2 Wireless Keyboard

Endorfy Thock V2 Wireless Keyboard

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed