Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 454 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 454 is 20110914.031 and its description was last modified on September 14, 2011 7:34:47 PM PDT.
Security Update 454 adds coverage for the following vulnerabilities and threats:
- Web Attack: Malicious File Download Request 10:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Blackhole Exploit Kit Website 3:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Injected Javascript:
This signature detects attempts to exploit machine through malicious JavaScript.
Security Update 454 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: Malicious Toolkit Request:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious SWF File Download:
This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution. - System Infected: Morto Worm Activity 2:
This signature detects Worm.Morto Activity on the infected computer. - Web Attack: Blackhole Exploit Kit Website 4:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Security Update 454 removes coverage for the following vulnerabilities and threats:
- System Infected: Morto Worm Activity:
This signature detects Worm.Morto Activity on the infected computer.
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.