Vulnerabilities are flaws in your programs or your
operating system that can create weaknesses in overall
security of your system. Improper computer
configurations or security configurations also create
vulnerabilities. External attackers exploit these
vulnerabilities and perform malicious actions on your
computer. Examples of such malicious attacks are
active desktop monitoring, keylogging, and hacking.
Such attacks can slow down the performance of your
computer, cause program failure, or expose your
personal data and confidential information to the
hackers.
Norton AntiVirus provides the signature-based
solutions to protect your computer from the most
common Internet attacks. Attack signatures contain
the information that identifies an attacker’s attempt
to exploit a known vulnerability in your operating
system or your computer programs. The Intrusion
Prevention feature of Norton AntiVirus uses an
extensive list of attack signatures to detect and block
suspicious network activity.
Vulnerability Protection lets you view the correlation
between the vulnerabilities that your computer is
protected against and the programs that may contain
these vulnerabilities. For example, if Internet Explorer
does not handle certain HTTP responses, it can result
in a vulnerability that can be exploited. In this case,
Vulnerability Protection lists Internet Explorer as a
vulnerable program. It also provides details about the
signatures that Intrusion Prevention uses to detect any
attempt to exploit this vulnerability.
Viewing the list of vulnerable programs
The Vulnerability Protection window lets you view
the extensive list of programs with the known
vulnerabilities that Norton AntiVirus protects you
against.
For each program, you can view details such as the
name of the program, its vendor, and the number of
195
Protecting Internet activities
About Vulnerability Protection
Summary of Contents for 10067161 - 10PK NORTON ANTIVIRUS
Page 30: ...Safe Web Lite Getting started About Norton AntiVirus main window 30...
Page 60: ...Getting started About Network Proxy settings 60...
Page 134: ...Trust Level Protecting your files and data About the Norton AntiVirus scans 134...
Page 271: ...Updates 271 Customizing protection features About customizing settings and options...
Page 276: ...Message Protection Customizing protection features About customizing settings and options 276...
Page 285: ...Other Settings 285 Customizing protection features About customizing settings and options...
Page 293: ...Product Security 293 Customizing protection features About customizing settings and options...
Page 306: ...Customizing protection features About customizing settings and options 306...
Page 324: ...Finding additional solutions About uninstalling 324...