Norton Internet Security logo

Security Update 490 for Norton Internet Security

Nov 10, 2011

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 490 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 490 is 20111109.030 and its description was last modified on November 9, 2011 3:50:09 PM PST.

Security Update 490 adds coverage for the following vulnerabilities and threats:

  • Fake App Attack: Fake AV Redirect 13:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • System Infected: IRC Bot C and C Activity:
    This signature detects malicious IRC instructions sent to the infected machine from the C and C servers.

  • Web Attack: Facebook LikeJacking Attack 22:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Fake App Attack: Fake AV Redirect 28:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Trojan Prime Activity:
    This signature detects malicious Backdoor Trojan activity on the compromised computer.


Security Update 490 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Acrobat PDF Suspicious File Download 8:
    This signature detects downloads of Adobe PDF files containing malicious content.

  • Web Attack: Malicious Toolkit Website 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Incognito Toolkit Website:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Mass Iframe Injection Attack 2:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.

  • Malicious Site: Trojan.Gen.2:
    This signature detects file downloads associated with Trojan.Gen.2.

  • Web Attack: Facebook LikeJacking 13:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Web Attack: Malicious Exploit Kit Website 6:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Malicious Site: Gamevance!gen1:
    This signature detects downloads related to GameVance which may display advertisements.

  • Web Attack: Blackhole Exploit Kit Website 11:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 12:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.