PRINT THIS PAGE
 

Browse the Web Safely

Symantec Internet Threat Meter
Web Activities
Use Extra Caution
MEDIUM
RISK
Use Extra Caution
Remote Code Exploit in Bash Shell (CVE-2014-6271)
On September 24, 2014, details of a remotely exploitable vulnerability in Bash were made public. A remote attacker could exploit vulnerable systems by executing arbitrary code via a crafted environment. >GNU Bash CVE-2014-6271 Remote Code Execution Vuln

How They Attack


How You Know


What To Do

PhishingPhishing
  • Fraudulent websites are used to steal personal information
  • Phishing attacks re-direct victims to a bogus Web site where malicious code is downloaded and used to collect sensitive information
  • When visiting a website, type the address directly into the browser rather than following a link
  • Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser
  • Do not provide personal information to any unsolicited requests for information
  • Confirm authenticity of a Web site with Norton Internet Security
SPYWARESpyware
  • Many "free" programs downloaded from the web install software that tracks your behavior and displays unwanted advertisements
  • Some web pages will attempt to install spyware when you visit their page
  • Allow only authorized programs to connect to the Web with Norton Internet Security
  • Do not accept or open suspicious error dialogs from within the browser
  • Spyware may come as part of a "free deal" offer - Do not accept free deals
VulnerabilityVulnerabilities
  • A vulnerability in the web browser may create a weakness in the computer security providing an opportunity for some websites to download malicious code
  • Install product updates and security patches before using the internet
  • Keep web browser up to date with latest patches
  • Make sure your computer is configured securely
  • Automatically shield newly discovered security holes with Norton Internet Security