Additional information (bl)

Blended threats

A blended threat is a type of malware whose functionality combines those of various malware types, such as worms, trojans, and backdoors, to breach and take over a target network effectively. Its infection chain is usually triggered by an event, such as a website visit. From there, a victim is redirected to a malicious site. Once on it, the victim is tricked into downloading the blended threat through clever social engineering. Downloading the file installs the malware on the victim’s computer, and the infection starts.
Blended threats come from the need to evade detection and remediation, because using several techniques to attack a computer system or a network can help to ensure that more systems are compromised and more people are harmed.

Blockchain Technology

A blockchain is essentially a digital ledger (DLT) of cryptocurrency transactions that is duplicated and distributed across a network of computer systems connected to the blockchain. Each block in the chain contains a number of transactions and every time there's a new transaction on the blockchain, a record of that transaction is added to every participant's ledger. Blockchain is a type of DLT in which transactions are recorded with an immutable cryptographic signature called a hash, this means that if one block in a chain was changed, it would be immediately apparent. If hackers wanted to corrupt a blockchain system, they would have to change every block in the chain. Bitcoin and Ethereum are fast growing blockchains, which significantly adds to the security of the ledger.
Most normal databases, such as an SQL database are centralised. Blockchain is different because nobody is in charge: it's run by the people who use it. What's more: bitcoins can't be faked, hacked or double spent, so there's a legitimate trust that it has some value.

Social (and other) things: