Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

10 big, huge things that are somehow smaller than Apple’s market cap and cash chest

August 18, 2015 Author: Category: Greg's Blog

Apple’s riches is a favorite topic of tech media; a bottomless well of inspiration for works of hyperbole, awe, blind devotion, huge numbers, and arbitrary financial comparisons that make varying amounts of sense, but contain mandatory “wowza!” of epic proportions. If you are out of Apple’s infinite financial loop, let…

read more

Letter: Be cautious with phone solicitation

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans After having been hacked on our computer, I reported the crime to the Clark County Sheriff’s Office. A deputy came out to talk with us. We showed him the phone number of the hacker, but there was nothing the police could…

read more

Grand Theft Auto V, Zumba Fitness and LEGO Jurassic World are this week’s Deals with Gold

August 18, 2015 Author: Category: Greg's Blog

Microsoft’s Larry Hryb (also known as Major Nelson) has revealed just what will be made available for consumers to enjoy this week as part of the Deals with Gold promotion. There are only a few entries for Xbox One owners, while those rocking the Xbox 360 will be able to…

read more

Android 6.0 Marshmallow app permissions: a closer look

August 18, 2015 Author: Category: Greg's Blog

After months of being simply known as “Android M”, it finally became clear that the upcoming major version of the OS will be known as Android 6.0 Marshmallow. The statue of the Android robot with a giant marshmallow was erected on the lawn in front of Alphabet’s most important subsidiary,…

read more

Ken Westin is a cyber stalker trying to make the internet a safer place

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans THE internet is sometimes described as the Wild West. And in this metaphor, Ken Westin is the biggest sheriff in town. He’s a professional cyber stalker who tracks down criminals using the trail left by their digital fingerprints. “I’m a hunter,”…

read more

Pharrell and One Direction are headlining Apple’s rebranded Music Festival

August 18, 2015 Author: Category: Greg's Blog

To promote the launch of Apple Music, the Cupertino giant is rebranding the iTunes Music Festival as Apple Music Festival. This year’s music extravaganza lasts ten days, unlike the usual month-long affair we’re used to, and will take place at London’s Roundhouse from September 19th, with Pharrell Williams, One Direction,…

read more

Apple iPhone 6s release date reconfirmed as September 18th by carriers

August 18, 2015 Author: Category: Greg's Blog

Just as suggested by the Best Buy AppleCare leak the other day, Apple will be releasing the new iPhones 6s and 6s Plus, or whatever they get named, on September 18th, or precisely a week after they go on preorder, as usual. In a typical fashion, Apple will announce the…

read more

HACKERS GET WALL STREET TIPOFFS, SPY ON UVA EMPLOYEES AND HARASS LIBRARIANS

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans In case you missed our coverage this week inThreatWatch, Nextgov’s regularly updated index of cyber breaches: University of Virginia Hacked in Suspected Chinese Espionage Case The data breach allegedly targeted the email accounts of two employees whose work is connected to…

read more

Cell Phones : [ Samsung Level Box Mini, Red ]

August 18, 2015 Author: Category: Greg's Blog

View full post on Products

read more

Cell Phones : [ Samsung Level Box Mini, Silver ]

August 18, 2015 Author: Category: Greg's Blog

View full post on Products

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved