Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Prisons turn to computer algorithms for deciding who to parole

October 17, 2013 Author: Category: Greg's Blog

  Prison parole boards are turning from intuition to computer assessments as states look to cut costs at correctional facilities, reports The Wall Street Journal. At least 15 states have begun requiring some type of risk assessment tool to help parole boards judge whether or not an inmate should be released. Many…

read more

Algorithms Can Catch And Stop Botnets

May 2, 2012 Author: Category: Greg's Blog

Indian computer scientists have developed an algorithm which can be used to not only catch a botnet on a computer network, but can also stop the malware from inflicting any harm upon a machine. The … View full post on National Cyber Security

read more

Malware authors adopt domain generation algorithms to evade detection

February 28, 2012 Author: Category: Greg's Blog

Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. DGAs are generally used as a fallback mechanism for sending instructions to infected computers when the hard-coded command and control…

read more

Malware authors expand use of domain generation algorithms

February 28, 2012 Author: Category: Greg's Blog

IDG News Service – Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. DGAs are generally used as a fallback mechanism for sending instructions to infected computers when the…

read more

Malware Authors Expand Use of Domain Generation Algorithms to Evade Detection

February 27, 2012 Author: Category: Greg's Blog

Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. DGAs are generally used as a fallback mechanism for sending instructions to infected computers when the hard-coded command and control…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved