Norton Internet Security logo

Security Update 449 for Norton Internet Security

Sep 8, 2011

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 449 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 449 is 20110907.030 and its description was last modified on September 7, 2011 5:00:21 PM PDT.

Security Update 449 adds coverage for the following vulnerabilities and threats:

  • System Infected: Malicious Backdoor Activity:
    This signature detects malicious Backdoor Trojan activity on the compromised computer.

  • System Infected: Morto Worm Activity 2:
    This signature detects Worm.Morto Activity on the infected computer.

  • System Infected: Morto Worm Activity 5:
    This signature detects Worm.Morto Activity on the infected computer.

  • System Infected: Malicious File Download Request 3:
    This signature detects malicious Backdoor Trojan activity on the compromised computer.


Security Update 449 provides updated coverage for the following vulnerabilities and threats:
  • Fake App Attack: Fake AV Website 9:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Blackhole Toolkit Website 2:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Blackhole Toolkit Website 3:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 9:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Exploit Kit Variant:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Variant:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.