• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

News Archive

Cybersecurity roundup – Jan to April ‘19

Estimated reading time: 2 minutes

2019 is not even halfway over and there is already a flurry of cyber attacks all over the globe. Network administrators and cybersecurity experts have to always be on their toes as, no one is safe from the risk...
Read More
May 22, 2019

Cybersecurity Predictions for 2019

Estimated reading time: 3 minutes

Another year is here. 2019 has just started and it is likely to shape up to be an eventful year for cybersecurity. Last year, in our 2018 predictions, we analyzed the year ahead and shortlisted various cybersecurity trends which...
Read More
February 22, 2019
  • 10
    Shares

How are social networking accounts used for malicious purposes?

social media

Estimated reading time: 3 minutes

Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly...
Read More
February 18, 2019
  • 8
    Shares

Biometric authentication data at risk

biometric-authentication

Estimated reading time: 3 minutes

You walk up to your car and the door opens on its own. You don’t need to turn the ignition – the car has already recognized you. You stop at a shop and pick out some breakfast. For payment,...
Read More
February 12, 2019
  • 14
    Shares

How to be a smart voter and not become a target of political campaigns on digital platforms

Estimated reading time: 3 minutes

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise...
Read More
February 11, 2019
  • 29
    Shares

Can EVMs get hacked? We tell you the truth

Estimated reading time: 3 minutes

It is the season of elections. The New Year of 2019 will see elections in countries from as varied as Nigeria to Israel to the European Union. But closer home, the Indian General Elections which will be held in...
Read More
February 4, 2019
  • 420
    Shares

What are intra-state cyber threats and how to handle them?

Estimated reading time: 3 minutes

In the new information age we live in, cyber threats represent an ever-growing and dangerous form of intimidation and pressure. These threats represent a new tool of warfare and seek to reap chaos and distrust. While much attention is...
Read More
January 28, 2019
  • 8K
    Shares

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident,...
Read More
November 12, 2018
  • 27
    Shares

The truth about the Twitter cryptocurrency giveaway

twitter-cryptocurrency-elon-musk

Estimated reading time: 3 minutes

Whether you like him or dislike him, one thing you can’t disagree with is that Elon Musk, the man behind Tesla and SpaceX, is a bonafide star. What he says makes news and his every utterance becomes a headline....
Read More
November 10, 2018
  • 1
    Share

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Estimated reading time: 1 minute

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. The name is Windows 10 October 2018 Update. This post lists down some of the highlights of Windows 10...
Read More
October 4, 2018
  • 18
    Shares
1 2 … 4 Next →

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.