Norton Internet Security logo

Security Update 624 for Norton Internet Security

May 31, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 624 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 624 is 20120530.001 and its description was last modified on May 30, 2012 3:03:12 PM PDT.

Security Update 624 provides updated coverage for the following vulnerabilities and threats:

  • Web Attack: Blackhole Toolkit Website 12:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Executable Download 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Javascript Website 2:
    This signature detects attempts to exploit machine through malicious JavaScript.

  • Web Attack: Malicious Java Download 13:
    This signature detects attempts to download malicious JAR files

  • Web Attack: Malicious Toolkit Website 25:
    Malicious toolkits can exploit known vulnerabilities of the target system by using known vulnerabilities.

  • Web Attack: Incognito Toolkit Website 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 18:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Exploit Toolkit Website 3:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • System Infected: Trojan Downloader Activity 6:
    This signature detects suspicious activities associated with the download of malware which may result in the compromise of the host.


Security Update 624 removes coverage for the following vulnerabilities and threats:
  • Web Attack: Malicious Java File Download 9:
    This signature detects attempts to download malicious JAR files


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.