Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.
To download and install the Security Update 618 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 618 is 20120518.002 and its description was last modified on May 21, 2012 4:42:13 PM PDT.
Security Update 618 adds coverage for the following vulnerabilities and threats:
- System Infected: Trojan Downloader Activity 3:
This signature detects suspicious activities associated with the download of malware which may result in the compromise of the host. - Web Attack: Malicious JAR File Download 11:
This signature detects attempts to download malicious JAR files. - Web Attack: Malicious Executable Download 5:
Scripts may be downloaded by a browser but be specified as an image, thus evading some types of monitoring software.
Security Update 618 provides updated coverage for the following vulnerabilities and threats:
- Fake App Attack: Misleading Application File Download 3:
A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure. - Web Attack: Blackhole Toolkit Website 2:
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. - Web Attack: Malicious Toolkit Website 9:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Blackhole Toolkit Website:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. - Web Attack: Exploit Toolkit Website 5:
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
www.symantec.com
0 comments: (+add yours?)
Post a Comment
Note: Only a member of this blog may post a comment.