• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

How do cyber criminals celebrate Valentine’s day

How do cyber criminals celebrate Valentine’s day

Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at...
Read Blog
February 13, 2018
201
Shares

Machine Learning: How close we are in Defeating Online Payment Fraud?

Machine Learning: How close we are in Defeating Online Payment Fraud?

Estimated reading time: 3 minutes

The unhindered growth of e-commerce and its impact has seemingly increased the risks of online fraud. Moreover, the attacks have amplified in terms of magnitude as the technologies adopted by the hackers are getting persuasive and more powerful, with...
Read Blog
February 12, 2018

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read Blog
February 9, 2018
12
Shares

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Cryptocurrency- The Good, The Bad & The Ugly

Cryptocurrency- The Good, The Bad & The Ugly

Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s...
Read Blog
February 6, 2018
4
Shares

Find out how safe you are on the Internet! Take this Quiz.

Find out how safe you are on the Internet! Take this Quiz.

Estimated reading time: < 1 minute

Take our quiz to find out how safe you are on the Internet. [slickquiz id=1]  
Read Blog
February 6, 2018
228
Shares
1

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Estimated reading time: 4 minutes

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro, CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns...
Read Blog
February 5, 2018
1

Multi-Factor Authentication: Everything you need to Know

Multi-Factor Authentication: Everything you need to Know

Estimated reading time: 3 minutes

It wouldn’t be wrong to assume that login credentials and other confidential user-specific insights are the most frequently compromised data sets, extensively targeted by the malicious parties. Since 2017 witnessed hackers breaching 711 million users records; thereby accessing around...
Read Blog
February 5, 2018
5
Shares

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018
← Previous 1 … 21 22 23 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies