Norton Internet Security logo

Security Update 594 for Norton Internet Security

Apr 19, 2012

Security Updates give the most recent protection content for Norton Internet Security, which protect networked critical systems and remote and mobile users from unwanted network intrusions and hackers, as well as from viruses, Trojans, and worms.

To download and install the Security Update 594 you need to run LiveUpdate feature of Norton Internet Security product. Please note that LiveUpdate definition identifier of Security Update 594 is 20120418.001 and its description was last modified on April 18, 2012 4:32:36 PM PDT.

Security Update 594 adds coverage for the following vulnerabilities and threats:

  • Web Attack: Facebook Manual Share 11:
    This signature will detect malicious web pages which are used for facebook likejacking attacks.

  • System Infected: Sabpab CnC Activity 3:
    This signature detects Sabpab trojan CnC activity on the infected machine.


Security Update 594 provides updated coverage for the following vulnerabilities and threats:
  • Web Attack: Malicious Toolkit Website 2:
    This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 9:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Blackhole Toolkit Website:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Toolkit Website 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious File Download Request 10:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Executable Download 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Exploit Kit Website 6:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Java Download 13:
    This signature detects attempts to download malicious JAR files

  • Web Attack: Blackhole Toolkit Website 14:
    This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious JAR File Download 6:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Malicious JAR File Download 9:
    This signature detects attempts to download malicious JAR files.

  • Web Attack: Incognito Toolkit Website 2:
    This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.

  • Web Attack: Malicious Java Download 6:
    This signature detects an attempt to detect vulnerability in Java which may result in remote code execution.

  • Web Attack: Microsoft Common Controls CVE-2012-0158:
    This signature detects attempts to exploit Microsoft Windows Common Controls.


Symantec Corporation
www.symantec.com

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.