Cybercrime has been in the news lately, with major publicized attacks on numerous social and retail giants, the Federal Reserve Bank, Adobe ebay and dozens of other high-profile organizations. Many of these attacks have taken advantage of basic, often unnoticed security vulnerabilities, such as poor patch management procedures, weak passwords, Web-based personal email services, and the lack of end-user education and sound security policies.
According to the 2014 Data Breach Investigations
Report by Verizon, cyber-espionage has risen up to three folds just
in the last year, with the United States being the largest victim by far. This
is no longer a problem of the defense industry; hackers are going after
intellectual property (IP) across the board in the private sector as
well.
“ACSG Corp. (Homeland Security)” IT Security Firm is dedicated to perform
research and development and build innovation around security of existing/new
technologies. Personnel of this firm also has been introduced with a vision of
improvising on new research ideas, threats detection, tools and methodologies
to contribute to the information security world.
Gopal
Singh Security researchers from India-based security firm (ACSG Corp. – Homeland Security) found
the critical vulnerability in the oracle domain and his name is also published in
Oracle Security Researchers List for the same. There are multiple vulnerabilities
reported by “ACSG Corp. (HomelandSecurity)” IT researcher and a report is sent to Oracle about the
vulnerability with a proof-of-concept exploit. This report contains
descriptions of Oracle product security vulnerabilities which have fixes
released for all supported versions and platforms for the associated product. The
follow up with team oracle has been taken regularly in order to fix the bug and
render a non-vulnerable security.
The nature and types of attacks have evolved
rapidly. Social media, cloud computing and a seemingly endless pool of mobile
devices are adding new threats almost daily. IT research firm “ACSG Corp. – Homeland Security”
predicts that by 2018, 25 percent of corporate data will bypass by perimeter
security and flow directly from mobile devices to the cloud and that is an up-gradation
by 4 percent in comparison to present capabilities.
*To find Services provided by ACSG Corp. please click here.