Norton Internet Security logo

Security Update 401 for Norton Internet Security

Jun 29, 2011

Security Updates give the most recent protection content for NIS product, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 401 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 401 is 20110625.050 and its description was last modified on June 27, 2011 6:10:59 PM PDT.

Security Update 401 adds coverage for the following vulnerabilities and threats:

  • Web Attack: Best Pack ToolKit Website:
    This signature detects attempts to download exploits from a Best Pack toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious SWF File Download:
    This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.

  • HTTP Trojan Zbot Domain Activity:
    This signature detects attempts to send suspicious HTTP activity indicative of the Zbot Trojan.

  • Fake App Attack: Misleading Application Suspicious Notification 5:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.


Security Update 401 provides updated coverage for the following vulnerabilities and threats:
  • Fake App Attack: Fake Codec Website:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Siberia Toolkit Activity 2:
    Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.

  • Web Attack: Malicious Toolkit Website 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Fake App Attack: Fake AV Website 14:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Fake App Attack: Fake AV Website 18:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Fake App Attack: Misleading Application Suspicious Notification:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.