• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: February 2019

Warning Signs that Your Computer is infected with malware – Part I

Warning Signs that Your Computer is infected with malware – Part I

Estimated reading time: 3 minutes

A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
Read Blog
February 27, 2019
2
Shares

Most common cybersecurity threats that occur in the healthcare sector

Most common cybersecurity threats that occur in the healthcare sector

Estimated reading time: 3 minutes

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Read Blog
February 25, 2019
14
Shares

Cybersecurity Predictions for 2019

Cybersecurity Predictions for 2019

Estimated reading time: 3 minutes

Another year is here. 2019 has just started and it is likely to shape up to be an eventful year for cybersecurity. Last year, in our 2018 predictions, we analyzed the year ahead and shortlisted various cybersecurity trends which...
Read Blog
February 22, 2019
10
Shares

How are social networking accounts used for malicious purposes?

How are social networking accounts used for malicious purposes?

Estimated reading time: 3 minutes

Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly...
Read Blog
February 18, 2019
8
Shares

GandCrab Riding Emotet’s Bus!

GandCrab Riding Emotet’s Bus!

Estimated reading time: 4 minutes

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes...
Read Blog
February 15, 2019
10
Shares

Increase in threats to mobile devices

Increase in threats to mobile devices

Estimated reading time: 3 minutes

There’s an increasing threat to mobile devices all over the world and it’s not difficult to wonder why. The number of those small mini-computers we carry around in our pockets has literally just exploded – an estimate observed that...
Read Blog
February 14, 2019
9
Shares

Biometric authentication data at risk

Biometric authentication data at risk

Estimated reading time: 3 minutes

You walk up to your car and the door opens on its own. You don’t need to turn the ignition – the car has already recognized you. You stop at a shop and pick out some breakfast. For payment,...
Read Blog
February 12, 2019
14
Shares

How to be a smart voter and not become a target of political campaigns on digital platforms

How to be a smart voter and not become a target of political campaigns on digital platforms

Estimated reading time: 3 minutes

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise...
Read Blog
February 11, 2019
29
Shares

Brute-force attacks – Traditional but still Effective

Brute-force attacks – Traditional but still Effective

Estimated reading time: 2 minutes

Brute-force attacks can probably be regarded as the first word in the alphabet of cybersecurity. Among the oldest ways of trying to gain unauthorized access to an account, brute-force attacks have been around forever. But the fact that despite...
Read Blog
February 7, 2019
24
Shares

MaaS Moving Towards APT as a Service?

MaaS Moving Towards APT as a Service?

Estimated reading time: 3 minutes

We have all heard about the dark web. It’s that mysterious part of the Internet which can’t be accessed normally, which is not indexed on a search engine and contains all the illegal activities that are taking place. Whether...
Read Blog
February 5, 2019
9
Shares
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies