Norton Internet Security logo

Security Update 666 for Norton Internet Security

Aug 4, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 666 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 666 is 20120803.002 and its description was last modified on August 3, 2012 2:49:50 PM PDT.

Security Update 666 adds coverage for the following vulnerabilities and threats:

  • Fake App Attack: Fake AV Website 31:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.


Security Update 666 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Blackhole Toolkit Website 2:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Fake App Attack: Fake AV Redirect 31:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Mass Injection Website:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.

  • Fake App Attack: Fake Scan Webpage 4:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • System Infected: Madi Trojan Activity 2:
    Trojan.Madi is a Trojan horse that opens a back door, downloads files, and steals information from the compromised computer.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.