(redirected from Blended threat)
Also found in: Thesaurus, Medical, Legal, Encyclopedia, Wikipedia.

Tro·jan 1

1. A native or inhabitant of ancient Troy.
2. A person of courageous determination or energy.

[Middle English, from Latin Trōiānus, from Trōia, Troy, from Greek Troiā, Trōiā, from Trōs, the mythical founder of Troy.]

Tro′jan adj.

Tro·jan 2

A celestial body that is in one of the two stable Lagrangian points of a two-body system, especially an asteroid with solar orbits at Jupiter's distance from the sun, but traveling 60° ahead of or behind the planet.

[From the official convention of naming such objects after the heroes of the Trojan War, a practice derived from the fact that the first such object to be observed was named after Achilles and the second after Patroclus.]


1. (Peoples) a native or inhabitant of ancient Troy
2. a person who is hard-working and determined
(Historical Terms) of or relating to ancient Troy or its inhabitants


(ˈtroʊ dʒən)
1. of or pertaining to ancient Troy or its inhabitants.
2. a native or inhabitant of Troy.
3. a person who shows determination or energy.
[before 900; Old English Trōiān < Latin Trōjānus]
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.Trojan - a native of ancient TroyTrojan - a native of ancient Troy    
Ilion, Ilium, Troy - an ancient city in Asia Minor that was the site of the Trojan War
Asian, Asiatic - a native or inhabitant of Asia
2.Trojan - a program that appears desirable but actually contains something harmfultrojan - a program that appears desirable but actually contains something harmful; "the contents of a trojan can be a virus or a worm"; "when he downloaded the free game it turned out to be a trojan horse"
malevolent program - a computer program designed to have undesirable or harmful effects
Adj.1.Trojan - of or relating to the ancient city of Troy or its inhabitantsTrojan - of or relating to the ancient city of Troy or its inhabitants; "Trojan cities"


A. ADJtroyano
B. Ntroyano/a m/f
to work like a Trojantrabajar como un mulo/una mula
C. CPD Trojan horse N (lit) → caballo m de Troya (fig) (concealing devious purposes) → tapadera f (Comput) → troyano m
Trojan War NGuerra f de Troya


(Hist) → Trojaner(in) m(f), → Troer(in) m(f); to work like a Trojan (fig)wie ein Pferd arbeiten; he’s a real Trojan (fig)er ist wirklich eine treue Seele
(Comput, Internet) → Trojaner m (inf)
adjtrojanisch; (fig)übermenschlich


[ˈtrəʊdʒən] adj & ntroiano/a
References in periodicals archive ?
Spyware is a classic example of a blended threat that can enter a network through multiple points including e-mail, Web browsing, instant messenger and peer-to-peer networks.
1) So-called blended threats that combine multiple attack vectors in one payload are often very large files that traverse the network gateway in separate packets; ServGate's security operating system (SGOS) with integrated HDD is able to arrest and isolate blended threat content and files in a gateway quarantine, creating an edge-based bulkhead against further transmission to other HDDs such as mail or web servers, desktop PCs and mobile devices.
Multiple methods of propagation can make containment of a blended threat an even greater challenge.
A blended threat is a security threat that uses multiple methods to attack or propagate; examples include Sadmind, CodeRed, Nimda and Lion.
7 which includes IP Reputation and the Blended Threat Module(TM),the industry's first integrated "in the cloud" malware protection and blended threat offering.
Enterprise-class Blended Threat Protection to Be Made Available for Marshal8e6 Email and Web Products
The company goes on to state that the Scob Trojan horse virus is a blended threat that exploits weaknesses in servers and Microsoft's Internet Explorer browser so that it can infect web sites and be passed on to the PCs of the web surfers that visit them.
Marshal8e6 recognizes customers' needs and have positioned themselves to be the "one-stop-shop" for integrated enterprise-class blended threat protection.
LINDON, Utah -- Avinti[R], a proactive e-mail security solutions company, announced a recent surge in blended threat e-mails, likely linked to the increase in holiday spam messages.
For example, a cyber criminal using a blended threat will install a keylogger onto a PC that captures personal information while he or she simultaneously turns the machine into a spam zombie that pumps out thousands of unsolicited messages claiming to be from brands like Viagra and Rolex.
The latest version of this type of blended threat includes the subject line "Movie-quality ecard" and provides an e-mail address of the sender to trick the recipient into clicking on the harmful link.
Security Alert: A powerful new blended threat dubbed the "Storm Worm" is spreading quickly across Europe and the United States.