Norton Internet Security logo

Security Update 496 for Norton Internet Security

Nov 18, 2011

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 496 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 496 is 20111117.030 and its description was last modified on November 17, 2011 3:01:15 PM PST.

Security Update 496 adds coverage for the following vulnerabilities and threats:

  • Web Attack: Mass Iframe Injection Attack 4:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.

  • Web Attack: Facebook LikeJacking Attack 24:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.


Security Update 496 provides updated coverage for the following vulnerabilities and threats:
  • HTTP IE Attribute Handler Code Exec:
    This signature detects a remote code execution vulnerability in the Microsoft Internet Explorer.

  • Web Attack: Malicious Toolkit Website 9:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Fake App Attack: Fake AV Download Request 2:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Malicious SWF File Download:
    This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.

  • Fake App Attack: Fake AV Website 23:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Malicious Javascript Website 2:
    This signature detects attempts to exploit machine through malicious JavaScript.


Security Update 496 removes coverage for the following vulnerabilities and threats:
  • Web Attack: Eleonore Toolkit Website 2:
    This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.