Norton Internet Security logo

Security Update 625 for Norton Internet Security

Jun 1, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 625 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 625 is 20120531.003 and its description was last modified on May 31, 2012 10:29:42 PM PDT.

Security Update 625 adds coverage for the following vulnerabilities and threats:

  • Web Attack: JRE Concurrency CVE-2012-0507 5:
    This signature detects an attempt to detect vulnerability in Java which may result in remote code execution.

  • System Infected: Tatanga.Trojan Activity:
    It is a banking trojan that drops different malwares to steal banking information once it has infected the system.

  • System Infected: Fake Plugin Activity:
    This signature detects attempts to download Fake Browser extensions on the user's machine.

  • Web Attack: Blackhole Toolkit Website 24:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • System Infected: W32 IRCBot NG Activity 2:
    This signature detects W32.Ircbot.NG activity on the infected machine.


Security Update 625 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Blackhole Toolkit Website 2:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Blackhole Toolkit Website 12:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Executable Download 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Javascript Website 2:
    This signature detects attempts to exploit machine through malicious JavaScript.

  • Web Attack: Mass Injection Website:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.

  • Web Attack: Exploit Toolkit Website 5:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Blackhole Toolkit Website 21:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Mass Injection Website 2:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.