Norton Internet Security logo

Security Update 368 for Norton Internet Security

Apr 13, 2011

Security Updates give the most recent protection content for Norton Internet Security product, which can protect computer from unwanted network intrusions and hackers, as well as from viruses, Trojans and worms.

To download and install the Security Update 368 you need to run LiveUpdate feature of Norton Internet Security product. The Security Update 368 adds coverage for the following vulnerabilities and network security threats:

  • HTTP Blackhole Toolkit Activity 5 — Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine;

Security Update 368 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Malicious Toolkit Website 8 — Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Flash application in a .pdf file or a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009;

  • Web Attack: Malicious Toolkit Website 10 — This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities;

  • HTTP Blackhole Toolkit Activity 3 — Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine;

  • Fake App Attack: Fake AV Download Request — Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.;

  • Web Attack: Exploit Kit Variant Activity 5 — This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities;

Security Update 368 removes coverage for the following vulnerabilities and threats:
  • HTTP Malicious Java Activity 4 — Malicious JAR files can lead to compromise of security of the machine where it is executed;

Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.