• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

POS security vulnerabilities for retail industry

POS security vulnerabilities for retail industry

Estimated reading time: 3 minutes

To have a look at how far technology has progressed, take a look at the simple art of shopping. What was, even a few years back, a simple matter of going to a brick-and-mortar shop, choosing an item and...
Read Blog
July 30, 2018
20
Shares

Tailgating: Security Risks Involved

Tailgating: Security Risks Involved

Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry...
Read Blog
July 27, 2018
4
Shares

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Estimated reading time: 6 minutes

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the...
Read Blog
July 25, 2018
1

Seqrite Mobile Device Management: Everything you need to know

Seqrite Mobile Device Management: Everything you need to know

Estimated reading time: 3 minutes

The proliferation of mobile devices has meant that there has been a sea of change in how business is conducted globally. Now, more than ever, mobile phone devices play a key role in business communication globally – from emails...
Read Blog
July 23, 2018
9
Shares

Your copy-paste habit can cost you your money

Your copy-paste habit can cost you your money

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to...
Read Blog
July 19, 2018
5
Shares

New Product Launch: Seqrite Secure Web Gateway

New Product Launch: Seqrite Secure Web Gateway

Estimated reading time: 3 minutes

More and more organizations are opting for a secure web gateway solution as the next step up from conventional security solutions. Secure web gateways prevent unsecured traffic from entering an organization’s internal network and prevent employees/users from accessing or...
Read Blog
July 18, 2018
1

Seqrite Endpoint Encryption: The encryption that your business needs

Seqrite Endpoint Encryption: The encryption that your business needs

Estimated reading time: 3 minutes

With data becoming an organization’s most valuable asset, the need of the hour for businesses is encryption, to protect their sensitive data, keep up with legal considerations, abide by global compliance policies and safeguard customer interests. Encryption is hence...
Read Blog
July 16, 2018
23
Shares

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

A new ransom-miner malware campaign emerging in wild!

A new ransom-miner malware campaign emerging in wild!

Estimated reading time: 5 minutes

Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked at our customer end. The further analysis of the malware ‘t.exe’ revealed that the malware seems to be Trojan dropper. Interestingly,...
Read Blog
July 11, 2018

Unstructured data: The unseen dangers

Unstructured data: The unseen dangers

Estimated reading time: 3 minutes

As the name suggests, unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures. While this kind of data can be text-heavy in the form of email messages, PDFs, business plans, unstructured data...
Read Blog
July 6, 2018
← Previous 1 … 38 39 40 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies