Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
Spyware
Heuristic
Blended
Rootkits
Submit