Norton Internet Security logo

Security Update 366 for Norton Internet Security

Apr 11, 2011

Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.

To download and install the Security Update 366 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 366 adds coverage for the following vulnerabilities and network security threats:

  • HTTP Malicious Java Activity 5 — Malicious JAR files can lead to compromise of security of the machine where it is executed;

  • Web Attack: Malicious JavaScript Download — Malicious JavaScript when executed will download other exploits on to the machine. This can compromise the machine;

Security Update 366 for Norton Internet Security provides updated coverage for the following vulnerabilities and threats:
  • HTTP K0de Toolkit Activity — Toolkit that allows the remote attacker to perform various malicious activity on the system and compromise it;

  • Web Attack: Phoenix Toolkit Website 3 and Phoenix Toolkit File Download 2 — Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer;

  • Web Attack: Eleonore Toolkit Website 4 — This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities;

  • HTTP Malicious Java Activity 1 — Malicious JAR files can lead to compromise of security of the machine where it is executed;

  • Web Attack: Blackhole Toolkit Website 3 and Blackhole Toolkit File Download — Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine;

  • Fake App Attack: Fake AV Redirect 13 — Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing — the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.;


Symantec Corporation

www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.