Performanta Services is characterised by a history of demonstrable successful implementations and optimised solutions across 5 Continents with a reach of over 1.2 million users.
Performanta Technologies invests in cutting-edge IT security technology to give our customers the edge in understanding the threats encountered across their security landscape.
No one is safe from getting hacked. This has been no more evident than in 2014 where we have seen some of the biggest high-end data breaches of large companies ever seen to date. Data, personal records and financial information has been stolen and sold on the black market in a matter of days. eBay, Target and more recently Sony … Read the restRead More
Performanta labs has received reports on rogue diet scam URLs that spread on Skype via compromised Skype accounts. Initial investigation concluded that there’s no malware involved on end user machines and devices, but that Skype credentials have been syphoned on unsecured or rogue networks.
It’s good to keep in mind that effective cyber attacks don’t have to necessarily include malware … Read the restRead More
The modern cyber security threat environment is growing rapidly. In the digital world, the inherent interconnectivity of people, devices and organisations, opens up a whole new playing field of vulnerabilities. The adoption of mobile computing resulted in blurring organisational boundaries, with IT getting closer to the user and further from … Read the restRead More
Originally posted by CRN at ChannelWeb.co.uk
Value-added resellers are perfectly placed to step in and help customers as the global threat landscape continues to escalate, argues Performanta Ltd CTO Lior Arbel
The cybersecurity threat landscape is changing. We are seeing an upsurge in basic to complex attacks from threat actors who are being aided by an increased availability of underground … Read the restRead More
Thought Leadership by CEO of Performanta Group. It focuses on the Insider Threat and more specifically the emotional aspect of People vs Data.
The Chief Information Security Officer today is faced with a myriad of frameworks, diagrams, legislative and regulatory compliances, technology deployments, etc. Many organisations have the belief that technology provides the much needed silver bullet when it comes … Read the restRead More
The Kovter bot initiated another malicious spam run over the weekend (25th July 2015). The malicious emails spread early morning Saturday. This wave is another effort from the Kovter bot to expand in the past few weeks. In this round, the emails claimed to be an “Indebted for driving on toll road #XXXXXXXXX” where the X’s are random numbers. Alerting … Read the restRead More
The patch resolves a security issue (CVE-2015-2426) that allows for remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains maliciously crafted embedded … Read the restRead More