• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security  /  Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab
Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab
26 June 2017

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Written by Ankita Ashesh
Ankita Ashesh
Cybersecurity, Endpoint Security

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks.

In April 2017, AVLab conducted a ‘Protection test against drive-by download attacks’. What does drive-by download mean?

A drive-by download occurs when a user unintentionally downloads a malicious software on their computer. This might occur on simply visiting a malicious website or opening a malicious email.

Example of a drive-by download attack

  • A user visits a website that contains a malicious advertisement.
  • The website automatically redirects the user to an infected web page.
  • Another redirection occurs and the user is taken to a webpage that scans the computer for security vulnerabilities.
  • If a vulnerability is found, it is then exploited to drop a malware on the user’s computer.

Seqrite Endpoint Security v7.2, that provides protection against threats such as drive-by downloads, was tested by AVLab.  And in the test results, the software was awarded a BEST+++ Certification.

What does BEST+++ Certification signify?

Seqrite Endpoint Security v7.2 receiving this certification implies that the software stopped all attacks of drive-by download carried out in the test.

To view the complete report, click here.

Best security practices to stay away from drive-by download attacks

  • Don’t use your computer in the administrator mode, if you can help it.
  • Always keep your computer and software patched and up-to-date.
  • Uninstall unnecessary or old software – these could be used for exploit attacks.
  • Go for an antivirus software that gives layers of protection so that an attack can be stopped at multiple levels.

 Previous PostAES-NI Ransomware adopts combination of Fileless and Code Injecti...
Next Post  Petya ransomware is affecting users globally, here are things you...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies