• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Security Challenges and Solutions to Ensure Cyber Security in FinTech

Estimated reading time: 2 minutes

The FinTech or financial technology industry, by its very nature, is favorite of hackers. As per the current status of FinTech organization’s security, you must have seen several security hacks, breaches, or data leaks in the past few years. In 2016,...
Read Blog
June 1, 2017

Brute force attack on Microsoft SQL

Brute force attack on Microsoft SQL

Estimated reading time: 2 minutes

In recent events, we have been observing that hackers have started targeting Microsoft SQL(MSSQL) servers using its open TCP port. The database is configured with weak password, despite administrators agreeing to the importance of it. The reasons could be ease...
Read Blog
May 4, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

5 Biggest Cyberattacks of 2016

5 Biggest Cyberattacks of 2016

Estimated reading time: 4 minutes

As the world is rapidly going digital, our privacy and security is more vulnerable than ever. Ignorance is no bliss and this is why we bring to you a roundup of some of the biggest cyberattacks of the year 2016....
Read Blog
December 1, 2016

Is your Remote Desktop System safe from Bruteforce attacks?

Estimated reading time: 3 minutes

As we have explained in the previous Troldesh ransomawre blog, Cyber criminals are now spreading and infecting ransomware by gaining access to computers through Remote Desktop. Remote access to the victim’s computer is gained by using brute-force techniques which...
Read Blog
October 18, 2016
2

WhatsApp – Now Encrypting All Your Messages and Chats

WhatsApp – Now Encrypting All Your Messages and Chats

Estimated reading time: 2 minutes

In welcome news, it was recently announced that WhatsApp has now adopted complete end-to-end encryption for all messages that are exchanged over it. With close to 1 billion WhatsApp users sending around 30 billion messages every day, the time...
Read Blog
April 13, 2016

5 Essential Security Tips for Startups

5 Essential Security Tips for Startups

Estimated reading time: < 1 minute

If you are planning to launch a startup business which essentially requires customers’ data for its development and sustainability, then IT security should be on your list of priorities. There is no denying to that fact that, investing in...
Read Blog
January 29, 2016

How Vulnerable is your Small and Medium-sized Business?

How Vulnerable is your Small and Medium-sized Business?

Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have...
Read Blog
January 29, 2016

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

Estimated reading time: 2 minutes

Original Post – May 21, 2015 Another new SSL (Secure Sockets Layer) vulnerability has come to light in the last few hours and your home computers and office workstations could be at risk. If you are familiar with the...
Read Blog
January 29, 2016
← Previous 1 … 7 8
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies