Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 581 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 581 is 20120330.002 and its description was last modified on March 30, 2012 4:10:34 PM PDT.
Security Update 581 adds coverage for the following vulnerabilities and threats:
- Web Attack: Malicious JAR File Download 7:
This signature detects attempts to download malicious JAR files. - Web Attack: Fake Browser Extension:
This signature detects attempts to download Fake Browser extensions on the user's machine. - Web Attack: Incognito Toolkit Website 2:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Security Update 581 provides updated coverage for the following vulnerabilities and threats:
- Web Attack: Eleonore Executable Download:
This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities. - Fake App Attack: Fake AV Redirect 29:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Fake App Attack: Misleading Application File Download 3:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Fake App Attack: Adware Installer Download:
This signature detects a file installer download which may be associated with adware. - Web Attack: Malicious Java Download 13:
This signature detects attempts to download malicious JAR files - Web Attack: Blackhole Toolkit Website 14:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Executable Download 3:
Scripts may be downloaded by a browser but be specified as an image, thus evading some types of monitoring software. - Fake App Attack: Fake AV Redirect 31:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Web Attack: Malicious JAR File Download 6:
This signature detects attempts to download malicious JAR files.
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.