Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Clicking on random FB apps may allow hackers to steal personal data: Cyber experts

September 19, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Hackers these days are waiting to access your personal details using such enticing apps, caution cyber experts. The victims whose data have been stolen or accounts hacked have now reached the Cyber Cell of Delhi Police. Special teams have been The…

read more

New laws to allow spies to hack into smartphones and computers ‘to be introduced in the coming weeks’

November 4, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Britain’s spies are about to be given huge new powers that will allow them to look in on people’s phones and computers, according to reports. A revived and re-named version of the hugely-controversial “Snoopers’ Charter” is set to give spies a…

read more

Microsoft Lumia 950 and Lumia 950 XL will allow color background photos on the Glance screen

October 10, 2015 Author: Category: Greg's Blog

It was all the way back in June 2013 when the Glance screen was introduced  for Windows Phone on the Nokia Lumia 925. At the time, it consisted of a standby clock, and would show notifications from the lockscreen. A double tap was all that was required to unlock the…

read more

Sony to allow 10k users to download and beta-test its Android 6.0 Marshmallow build

October 7, 2015 Author: Category: Greg's Blog

The latest build of Google’s mobile operating system — Android 6.0 Marshmallow — is just around the corner. It has already started rolling out to miscellaneous Android One handsets and will be hitting the Nexus 6 and Nexus 5 very soon. As we know, various manufacturers do take their time…

read more

Kid cyber conferences allow them to “Go hack yourself”

September 22, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans “My primary goal of hacking was the intellectual curiosity, the seduction of adventure.” – Kevin Mitnick “A white-hat hacker is someone who enjoys thinking of innovative new ways to make, break and use anything to create a better world.” – Nico…

read more

Your Android phone’s battery life could allow it to be tracked across different sites

August 6, 2015 Author: Category: Greg's Blog

A feature belonging to the HTML5 Battery Status API allows a website to know how much battery life is remaining on a device being used to visit it. The feature reveals battery life remaining for devices using the Chrome, Firefox or the Opera browsers. Among the data revealed by the…

read more

Popcorn Time vulnerability could allow hackers to take over your computer

August 4, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans One of the most popular movie streaming apps online might be a prime target for hackers. On Monday, TorrentFreak shared a report from Antonios Chariton (aka DaKnOb), a security engineer and researcher who discovered a major vulnerability in one of the most popular…

read more

Legislation Would Criminalize Revenge Porn; Allow Search Warrants for Cyber Crimes

March 3, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans [AG Harris] – Attorney General Kamala D. Harris announced a package of bills Monday that will increase protections for victims and provide tools for law enforcement to prosecute the growing number of cyber-exploitation cases in California. Cyber-exploitation, commonly known as revenge…

read more

Groups fear bill would allow free flow of data between private sector and NSA

June 27, 2014 Author: Category: Greg's Blog

A draft U.S. Senate bill aimed at making it easier for organizations to share cyberthreat information poses serious threats to personal privacy, several rights groups said in a letter to Congress on Thursday. View full post on Computerworld Cybercrime and Hacking News ________________ Other Sites You May Like: Read More…….

read more

Latest Android Crypto Exploit Allow Attacker to read WhatsApp , facebook , Instagram Chat Database

March 28, 2014 Author: Category: Greg's Blog

Bad programming practices , Android malware attack is to open the database backup WhatsApp chat. Boss Bosschert, a self- billed “consultant / sysadmin / business , ” that is used by WhatsApp messages stored locally on the local access database file system as any other Android, read by the application…

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved