Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 551 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 551 is 20120216.002 and its description was last modified on February 16, 2012 5:46:22 PM PST.
Security Update 551 adds coverage for the following vulnerabilities and threats:
- Web Attack: Facebook Manual Share 3:
This signature will detect malicious web pages using manual sharing as spreading vector.
Security Update 551 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: MSIE CSS Tag CVE-2010-3962:
This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution. - Web Attack: Blackhole Toolkit Website 12:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Java Class Download 2:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Exploit Kit Website 6:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Blackhole Exploit Kit Website 11:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Java Download 13:
This signature detects attempts to download malicious JAR files - Web Attack: Adobe Flash CVE-2011-2140 2:
This signature detects a buffer overflow vulnerability in Adobe Flash Player. - Web Attack: Blackhole Toolkit Website 14:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Fake App Attack: Fake AV Website 28:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Web Attack: Mass Injection Website:
It is an attack where an iframe which points to a malicious site is injected in large number of clean websites. - Web Attack: Malicious JAR File Download 6:
This signature detects attempts to download malicious JAR files.
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.