Norton Internet Security logo

Security Update 532 for Norton Internet Security

Jan 29, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 532 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 532 is 20120117.002 and its description was last modified on January 17, 2012 4:36:32 PM PST.

Security Update 532 adds coverage for the following vulnerabilities and threats:

  • Web Attack: Bleeding Life Toolkit Activity:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • System Infected: Bamital Trojan Activity 3:
    This signature detects a request to specific domains which characteristically has been known to host malicious exploits and executable files.


Security Update 532 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Malicious Toolkit Website 2:
    This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Eleonore Executable Download:
    This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Javascript:
    This signature detects attempts to exploit machine through malicious JavaScript.

  • Web Attack: Malicious Toolkit Website 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Java Download Attack 5:
    This signature detects attempts to exploit Java 'Applet2ClassLoader' Class Unsigned Applet Remote Code Execution Vulnerability.

  • Fake App Attack: Fake AV Redirect 27:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Oracle Java Rhino Script Engine CVE-2011-3544:
    This signature detects attempts to exploit Rhino Script Engine Remote Code Execution Vulnerability.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.