Norton Internet Security logo

Security Update 583 for Norton Internet Security

Apr 4, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 583 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 583 is 20120403.002 and its description was last modified on April 3, 2012 2:53:01 PM PDT.

Security Update 583 adds coverage for the following vulnerabilities and threats:

  • Malicious Site: Malicious Request:
    You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.

  • Web Attack: Malicious Java Download 4:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Java Download 6:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.


Security Update 583 provides updated coverage for the following vulnerabilities and threats:
  • Fake App Attack: Fake AV Redirect 29:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Fake App Attack: Fake AV Redirect 6:
    A Web based attack relating to misleading applications has been blocked. No further action is required, but you may wish to update your virus definitions and run a full system scan as a precautionary measure.

  • Web Attack: Malicious Executable Download:
    Scripts may be downloaded by a browser but be specified as an image, thus evading some types of monitoring software.

  • Web Attack: Acrobat PDF Suspicious File Download 8:
    This signature detects downloads of Adobe PDF files containing malicious content.

  • Web Attack: Malicious Executable Download 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious JAR File Download 6:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Malicious Java Class Download 4:
    This signature detects attempts to download malicious JAR files


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.