blended threat
Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities to initiate, transmit, and spread an attack. By using multiple methods and techniques, blended threats can rapidly spread and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points, and exploits vulnerabilities. [Source: Symantec Security Response Web site
]
Read Also:
- bliki
Short for blog and wiki, bliki is a type of blog that can be edited by readers or an agreed upon group of collaborators, contributors and editors. See blog and wiki for a better understanding of the term bliki.
- blind drop
In malware and virus terminology, a blind drop is a message board, forum, BBS or other Internet site where attackers and botnet nodes can anonymously post or check for messages and new instructions.
- Bloatware (Bloated Software)
(blōt´wãr) (n.) jargon Bloatware is the slang phrase used to describe software that has lots of features and requires considerable disk space and RAM to install and run. As the cost of RAM and disk storage has decreased, there has been a growing trend among software developers to disregard the size of applications and the […]
- block
(n.) (1) In word processing, a block is a group of characters that you have marked to perform some action on them. For example, to move a section of text, you must first block it. This is sometimes called a block move. To specify a block of text, you press special function keys (or click […]
- block down converter
In satellite communications, a block down converter is the name of a device used to convert a 3.7 to 4.2 KHz signal down to 1-GHz and lower frequencies (UHF).