• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Again! A New .NET Ransomware Shrug2

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build...
Read Blog
August 10, 2018

What is EMM? Enterprise Mobility Management explained

What is EMM? Enterprise Mobility Management explained

Estimated reading time: 3 minutes

With the advent of mobile devices and now, currently, the Internet of Things (IoT), mobility has become the buzzword in enterprises. It is not only about managing one physical network in a location – now employees have a range...
Read Blog
August 9, 2018
5
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares

POS security vulnerabilities for retail industry

POS security vulnerabilities for retail industry

Estimated reading time: 3 minutes

To have a look at how far technology has progressed, take a look at the simple art of shopping. What was, even a few years back, a simple matter of going to a brick-and-mortar shop, choosing an item and...
Read Blog
July 30, 2018
20
Shares

Tailgating: Security Risks Involved

Tailgating: Security Risks Involved

Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry...
Read Blog
July 27, 2018
4
Shares

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Estimated reading time: 6 minutes

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the...
Read Blog
July 25, 2018
1

Seqrite Mobile Device Management: Everything you need to know

Seqrite Mobile Device Management: Everything you need to know

Estimated reading time: 3 minutes

The proliferation of mobile devices has meant that there has been a sea of change in how business is conducted globally. Now, more than ever, mobile phone devices play a key role in business communication globally – from emails...
Read Blog
July 23, 2018
9
Shares

Your copy-paste habit can cost you your money

Your copy-paste habit can cost you your money

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to...
Read Blog
July 19, 2018
5
Shares

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Seqrite Endpoint Encryption: The encryption that your business needs

Seqrite Endpoint Encryption: The encryption that your business needs

Estimated reading time: 3 minutes

With data becoming an organization’s most valuable asset, the need of the hour for businesses is encryption, to protect their sensitive data, keep up with legal considerations, abide by global compliance policies and safeguard customer interests. Encryption is hence...
Read Blog
July 16, 2018
23
Shares
← Previous 1 … 38 39 40 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies