Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Computer hacker tries to steal $1.8 million from Arlington’s bank account

April 1, 2012 Author: Category: Greg's Blog

The money was recovered, and an investigation continues. View full post on federal hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Is Facebook preventing critics from downloading their account data?

March 7, 2012 Author: Category: Greg's Blog

Do you want to leave Facebook? Some departing users are claiming that the social network simply doesn’t want to say goodbye to their data.. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

How to hack a diablo 2 account

February 26, 2012 Author: Category: Greg's Blog

This video is about how to hack a diablo 2 accound. This method is absolutely legal and blizzard cant ban u because the will believe you and the can only ban u if u use hacks or cheats, and you dont need any hacks to do this. So enjoy and…

read more

ProtectMyID: It’s worth repeating: NEVER reply to ‘online account verification’ requests with your personal information. #cybersmarts

February 11, 2012 Author: Category: Greg's Blog

ProtectMyID: It’s worth repeating: NEVER reply to ‘online account verification’ requests with your personal information. #cybersmarts View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

ProtectMyID: Credit protection involves wise spending. Be sure to use your 2011 Flexible Spending Account. See if your provider offers a grace period.

February 4, 2012 Author: Category: Greg's Blog

ProtectMyID: Credit protection involves wise spending. Be sure to use your 2011 Flexible Spending Account. See if your provider offers a grace period. View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

What do I do if my Twitter account is hacked?

January 28, 2012 Author: Category: Greg's Blog

Many Naked Security readers ask for assistance when their accounts are hacked, or when their friends, family and colleagues need assistance. This article explains the steps needed to safely reacquire control of your Twitter account. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Grassley Twitter account hacked

January 27, 2012 Author: Category: Greg's Blog

WATERLOO – Sen. Charles Grassley 's Twitter account was hacked Monday, one of the tell-tale signs being the hacker Tweeted in complete sentences. View full post on politics hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Hackers tap Salem Co. account for $19,000

January 22, 2012 Author: Category: Greg's Blog

SALEM — Computer hackers have broken in and stolen approximately $19,000 by way of an illegal wire transfer from a Salem County bank account that held more than $13 million in funds. View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber…

read more

Facebook Down: Worm Steals Login Info of 45K, How to Protect Your Account

January 9, 2012 Author: Category: Greg's Blog

Like us on Facebook The stolen credentials were used to spread the virus to other friends and to even attack the victim’s other web-based services, as many users use the same passwords for other services like their e-mail accounts and other social media sites. According to Microsoft, the Ramnit virus…

read more

Twitter verifies fake Wendi Deng account

January 6, 2012 Author: Category: Greg's Blog

A spoof Twitter account impersonating Wendi Deng Murdoch was verified by Twitter, and taken as real by News Corp’s media communications team and members of the public. The spoof account of the wife of media baron Rupert Murdoch is being seen as a prime example of how people’s identities can…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved