Trojan

(redirected from Blended threat)
Also found in: Dictionary, Medical, Legal, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Synonyms for Trojan

a native of ancient Troy

a program that appears desirable but actually contains something harmful

Synonyms

Related Words

References in periodicals archive ?
A blended threat will attempt to attack a system in a number of different ways.
The new release of MailMarshal SMTP including the Blended Threat Module is the first M86 Security product to fully interact with the behavioral malware detection technology from Avinti, acquired by M86 earlier this year.
Based on Avinti's unique behavior-based technology, Marshal8e6's Blended Threat Module[TM] for MailMarshal SMTP and R3000 products will provide organizations a cloud-based service to stop blended threats.
The acquisition strengthens Marshal8e6's ability to stop the emerging threat techniques known as blended threats and bridges the gap in security protection between email and the Web.
Blended threats are an increasingly popular way for hackers to bypass traditional e-mail security by using messages that include embedded hyperlinks to URLs or IP addresses on the Web.
Blended threat attacks have risen, as hackers have increasingly used the tactic to circumvent detection by traditional signature-based AV products.
Our signatures are specifically designed to catch variants of blended threats such as the Storm Worm.
Aladdin Knowledge Systems announced the general availability of eSafe 4 Feature Release 2 the latest version of its integrated proactive content security solution with new AppliFilter technology to block blended threats.
The survey, conducted in late August of 200 IT security officials from Germany, France, Sweden, Netherlands and the United Kingdom, said 28 per cent of the respondents do not have any fortifications in place to prevent blended threats.
Blended threats are more difficult to protect your computer against as they distribute themselves like a virus but behave like a worm (a programme that replicates itself by slithering through networks and eating up storage space) and also have traits of a Trojan horse (a malicious programme disguised as something benign like a screen saver).
The key to effectively secure an enterprise against such blended threats is to address security across all tiers--the gateway, server, and desktop--and across multiple functions--firewall, anti-virus, virtual private networking, intrusion detection, and vulnerability management.
0 detects and removes all forms of adware and spyware including Trojans, keyloggers, system monitors, blended threats, and it can discover and eradicate more than 27,000 spyware traces.
Dealing with today's growing number of complex blended threats requires a fast response based on timely and accurate information," said John O'Keefe, senior Internet services analyst, Current Analysis, Inc.
It does not, however, eliminate the risk to the storage system itself nor does it address more aggressive blended threats.
And despite the fact that an estimated 95% of all organisations already deploy an antivirus solution, 238 responded that they are evaluating antivirus technologies to bolster their defence against the new viruses and blended threats that respondents identified as a business challenge in the year ahead.