Norton Internet Security logo

Security Update 459 for Norton Internet Security

Sep 23, 2011

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 459 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 459 is 20110922.030 and its description was last modified on September 22, 2011 3:47:03 PM PDT.

Security Update 459 adds coverage for the following vulnerabilities and threats:

  • System Infected: Malicious File Download Request 9:
    This signature will detect attempt to download malicious files through HTTP requests.

  • System Infected: W32 Qakbot Activity 2:
    This signature detects attempts by W32.Qakbot to download additional files onto the infected system.

  • Web Attack: Facebook LikeJacking 13:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.


Security Update 459 provides updated coverage for the following vulnerabilities and threats:
  • Fake App Attack: Fake AV File Download 4:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Adobe Flash Embedded SWF CVE-2011-0611:
    This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Flash Player.

  • Web Attack: Facebook LikeJacking Attack 4:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Web Attack: Malicious Injected Javascript:
    This signature detects attempts to exploit machine through malicious JavaScript.

  • System Infected: Dalbot Backdoor Activity:
    Dalbot is a backdoor trojan that allows attackers unauthorized access and control of an affected computer.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.