<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.mywot.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Blended_Threat</id>
	<title>Blended Threat - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.mywot.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Blended_Threat"/>
	<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;action=history"/>
	<updated>2026-05-01T18:54:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=7426&amp;oldid=prev</id>
		<title>Nixiewot at 11:59, 19 February 2012</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=7426&amp;oldid=prev"/>
		<updated>2012-02-19T11:59:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 11:59, 19 February 2012&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;A blended threat is a &lt;/del&gt;sophisticated &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;attack &lt;/del&gt;that &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;bundles &lt;/del&gt;some of the worst aspects of [[Computer Virus|Viruses]], Worms, [[Trojan Horse|Trojan Horses]] and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;malicious code &lt;/del&gt;into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;also &lt;/del&gt;spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;propagates &lt;/del&gt;using multiple methods, the attack can come from multiple points, and blended threats &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;also &lt;/del&gt;exploit vulnerabilities. To be considered a blended thread, the attack would normally &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;serve to &lt;/del&gt;transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;would &lt;/del&gt;also&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, for example, &lt;/del&gt;install a [[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Backdoor|&lt;/del&gt;Backdoor]] and maybe &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;even &lt;/del&gt;damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;a worm may &lt;/del&gt;travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;file-sharing sharing networks&lt;/del&gt;. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;.exe files&lt;/del&gt;, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time. [http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Blended threats are &lt;/ins&gt;sophisticated &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;attacks &lt;/ins&gt;that &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;bundle &lt;/ins&gt;some of the worst aspects of [[Computer Virus|Viruses]], &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[[Computer Worm|&lt;/ins&gt;Worms&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]]&lt;/ins&gt;, [[Trojan Horse|Trojan Horses]] and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[[Malware]] &lt;/ins&gt;into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;propagate &lt;/ins&gt;using multiple methods, the attack can come from multiple points, and blended threats exploit vulnerabilities. To be considered a blended thread, the attack would normally transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;could &lt;/ins&gt;also install a [[Backdoor]] and maybe damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;worms &lt;/ins&gt;travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;P2P&lt;/ins&gt;. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;executables&lt;/ins&gt;, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time. [http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Nixiewot</name></author>
		
	</entry>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=768&amp;oldid=prev</id>
		<title>Bob Zenith at 23:11, 11 April 2010</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=768&amp;oldid=prev"/>
		<updated>2010-04-11T23:11:49Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 23:11, 11 April 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A blended threat is a sophisticated attack that bundles some of the worst aspects of [[Computer Virus|&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;viruses&lt;/del&gt;]], &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;worms&lt;/del&gt;, [[Trojan Horse|Trojan Horses]] and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities. To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a [[Backdoor|Backdoor]] and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A blended threat is a sophisticated attack that bundles some of the worst aspects of [[Computer Virus|&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Viruses&lt;/ins&gt;]], &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Worms&lt;/ins&gt;, [[Trojan Horse|Trojan Horses]] and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities. To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a [[Backdoor|Backdoor]] and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Bob Zenith</name></author>
		
	</entry>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=767&amp;oldid=prev</id>
		<title>Bob Zenith: Created page with 'A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan Horses and malicious code into one…'</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Blended_Threat&amp;diff=767&amp;oldid=prev"/>
		<updated>2010-04-11T23:11:16Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;#039;A blended threat is a sophisticated attack that bundles some of the worst aspects of &lt;a href=&quot;/wiki/index.php/Computer_Virus&quot; title=&quot;Computer Virus&quot;&gt;viruses&lt;/a&gt;, worms, &lt;a href=&quot;/wiki/index.php/Trojan_Horse&quot; title=&quot;Trojan Horse&quot;&gt;Trojan Horses&lt;/a&gt; and malicious code into one…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;A blended threat is a sophisticated attack that bundles some of the worst aspects of [[Computer Virus|viruses]], worms, [[Trojan Horse|Trojan Horses]] and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities. To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a [[Backdoor|Backdoor]] and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks. Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.&lt;/div&gt;</summary>
		<author><name>Bob Zenith</name></author>
		
	</entry>
</feed>