Threat

(redirected from Blended threat)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.

THREAT, crim. law. A menace of destruction or injury to the lives or property of those against whom it is made.
     2. Sending threatening letters to persons for the purpose of extorting money, is said to, be a misdemeanor at common law. Hawk. B. 1, c. 53, s. 1; 2 Russ. on Cr. 575; 2 Chit. Cr. L. 841; 4 Bl. Com. l26. To be indictable, the threat must be of a nature calculated to overcome a firm and prudent man. The party who makes a threat may be held to bail for his good behaviour. Vide Com. Dig. Battery, D; 13 Vin. Ab. 357.

THREAT, evidence. Menace.
     2. When a confession is obtained from a person accused of crime, in consequence of a threat, evidence of such confession cannot be received, because, being obtained by the torture of fear, it comes in so questionable a shape, that no credit ought to be given to it; 1 Leach, 263; this is the general principle, but what amounts to a threat is not so easily defined. It is proper to observe, however, that the threat must be made by a person having authority over the prisoner, or by another in the presence of such authorized person, and not dissented from by the latter. 8 C. & P. 733. Vide Confession, and the cases there cited.

A Law Dictionary, Adapted to the Constitution and Laws of the United States. By John Bouvier. Published 1856.
References in periodicals archive ?
One of the most dangerous aspects of a blended threat is that it can exploit vulnerabilities.
Both regional and targeted attacks affect fewer users than in the past, and often involve blended threats. This presents a new challenge for security companies, for cleaning narrowly focused, self-updating malware is much more difficult than cleaning a widespread, static worm.
Viruses, worms, Trojan horses, zombies, distributed denial-of-service attacks, hacking, and blended threats are all out there, and many can hitch rides with e-mails, downloads and electronic transmissions, including instant messages.
* Blended threats. Worms with multiple infection and entry methods that require a combination of strong policies, updated signature files and visibility to stop their lightening-quick movement.
SurfControl protects enterprises from blended threats by offering protection for web, e-mail, instant messaging, peer-to-peer and mobile computing through its SurfControl Adaptive Threat Intelligence Service.
These threats include e-mail worms, remote access Trojans, spyware, adware, network worms, blended threats, as well as multistage, incremental infections using all of the above.
Blended threats, which combine the characteristics of viruses, worms, Trojan horses, and malicious code, are increasing at a significant rate.
Today's trends show increased numbers of a new type of threats called "blended threats." The difference between traditional viruses and today's blended threats is that blended threats attack multiple points, spread without human intervention, and exploit vulnerabilities.
Blended threats, which combine the characteristics of viruses, worms and Trojan horses, are beginning to spread rapidly and are causing widespread disruption to some companies' systems.
"It's clear that the consumer business benefited from the rash of blended threats," CEO John Thompson said.
that protects businesses from security breaches, virus attacks and blended threats. McAfee Security provides comprehensive network protection through industry leading anti-virus, encryption, desktop firewall, intrusion detection, viral vulnerability assessment, and online managed services.
Sharon Ruckman is senior director of product management at Symantec Security Response, a global group of Internet security professionals and services that combat emerging "blended threats" against computers and networks.