• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Encryption solution for educational institutes

Encryption solution for educational institutes

Estimated reading time: 3 minutes

When the discussion veers around topics like data security and breach, what are the kinds of organizations which, you think, are most likely at risk? The first answer that comes to your minds might be banks or big multinational...
Read Blog
October 11, 2018
11
Shares

Business Benefits of deploying Mobile Device Management

Business Benefits of deploying Mobile Device Management

Estimated reading time: 3 minutes

The mobile is literally everywhere. It has permeated almost everyone’s lives which mean the distinctions between the personal and the professional have narrowed. A personal cell phone is used for a lot of professional work by employees. Think of...
Read Blog
October 6, 2018
11
Shares

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. The name is Windows 10 October 2018 Update. This post lists down some of the highlights of Windows 10...
Read Blog
October 4, 2018
18
Shares

Emerging trend of spreading malware through IQY files

Emerging trend of spreading malware through IQY files

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as...
Read Blog
October 3, 2018
13
Shares

What is a Red Team Assessment and why does RBI endorse it?

What is a Red Team Assessment and why does RBI endorse it?

Estimated reading time: 3 minutes

When it comes to cybersecurity for enterprises, one sector that finds itself at a lot of risk is the banking sector. Banks conduct financial transactions which can be worth millions in value every single day which mean they present...
Read Blog
September 25, 2018
8
Shares
1

The Big Question – Internet of Things or Internet of Threats?

The Big Question – Internet of Things or Internet of Threats?

Estimated reading time: 3 minutes

The tech world seems to be gearing up for the fourth industrial revolution with an estimated 20 billion Internet of Things devices expected to be deployed by the year 2020. While these technical marvels are being designed to streamline...
Read Blog
September 24, 2018
6
Shares

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)?

Estimated reading time: 3 minutes

Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...
Read Blog
September 23, 2018
4
Shares

Rise of security risks on Mobile

Rise of security risks on Mobile

Estimated reading time: 3 minutes

According to a recent survey, the number of mobile phone users in the world is expected to pass 5 billion in 2019. That’s an incredible number of people using mobile phones. Truly, when we talk about a digital connected...
Read Blog
September 16, 2018
3
Shares

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Estimated reading time: 3 minutes

For all the high-tech security that is employed, an organization’s biggest chink in its defense, when it comes to cybersecurity, can be its own employees. That is not to say that these employees are deliberately doing what they are,...
Read Blog
September 14, 2018
7
Shares

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...
Read Blog
September 12, 2018
← Previous 1 … 36 37 38 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies