Trojan

(redirected from Blended threat)
Also found in: Dictionary, Medical, Legal, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Synonyms for Trojan

a native of ancient Troy

a program that appears desirable but actually contains something harmful

Synonyms

Related Words

References in periodicals archive ?
A blended threat will attempt to attack a system in a number of different ways.
Real-time Protection - from advanced blended threats by integrating both its Advanced Virus Control technology and Real-time protection, thus allowing you to enjoy your digital life.
Websense security solutions help K-12 schools address these challenges, enabling productive use of the web; protecting against inbound threats such as spam, malware, and blended threats; and helping to ensure compliance.
In addition to providing complete risk analysis prior to provisioning access for employees and contractors, AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT security, Physical Access Controls and Industrial Control Systems.
Product Management, Cyberoam, ?We understood from the small office customer experience, that despite their reliance on desktop security, because of open Internet gateways, they continue to suffer from blended threats and malware in the network.
"Malicious URLs appear in emails, phishing attacks, and sophisticated blended threats that target multiple protocols.
Dhanjani (Ernst & Young), Rios (Microsoft), and Hardin (McAfee) also illustrate how the complexity of managing the interactions among multiple software packages has opened the door to blended threats, and how hackers are positioning themselves to exploit cloud platforms.
The WatchGuard XCS 770, 970 and 1170 series effectively tackle blended threats and malware, providing zero-hour threat outbreak response as well as advanced content filtering and protection, which scans inbound as well as outbound e-mails for malicious content," concluded Croce.
Supporting up to 3000 users, Cyberoam meets the data protection requirements of SMB and enterprise segments.<p>Says Harish Chib, Vice-President -- New Business Development, Cyberoam, "Blended threats do not distinguish between the gateway and the end point to gain entry.
With its built in application proxies, the WatchGuard XTM 8 Series natively stops a myriad of blended threats, fragmented and malformed packet attacks, spyware, malware, denial of service and many other types of threats and attacks.
Trend Micro also sees the blending of email and web threats to create both harmful and viral threats, as well as the use of blended threats, multiple pieces of malware working together.
Symatec urges all user to update their anti-virus software and to beware of 'blended threats' which include the possibility of spyware and adware entering PC systems infected with the W32.Stration.AC@mm worm.
Fortinet solutions were built from the ground up to integrate multiple levels of security protection -- including firewall, antivirus, intrusion prevention, Web content filtering, VPN, spyware prevention and antispam -- providing customers a way to protect multiple threats as well as blended threats. Leveraging a custom ASIC and unified interface, Fortinet solutions offer advanced security functionality that scales from remote office to chassis-based solutions with integrated management and reporting.
* Security Measure Deployment: Today's cyber security threat landscape is continually changing with new blended threats leveraging different types of malicious code such as viruses, worms, and Trojan horse programs.