Norton Internet Security logo

Security Update 584 for Norton Internet Security

Apr 5, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 584 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 584 is 20120404.002 and its description was last modified on April 4, 2012 3:14:09 PM PDT.

Security Update 584 adds coverage for the following vulnerabilities and threats:

  • Attack: Microsoft RDP CVE-2012-0002 4:
    This signature detects attempts to exploit a remote code execution vulnerability in Microsoft RDP.



Security Update 584 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Malicious Java Download 13:
    This signature detects attempts to download malicious JAR files

  • Web Attack: Manual Sharing Scam:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • Web Attack: Mass Injection Website:
    It is an attack where an iframe which points to a malicious site is injected in large number of clean websites.

  • Web Attack: Malicious JAR File Download 6:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Malicious Cookie Activity 4:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Incognito Toolkit Website 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Java Download 6:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.