­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Anatomy of a security hole – the break that broke sudo

May 20, 2012 Author: Category: Greg's Blog

A recently-patched bug in the widely-used sudo command makes for interesting reading. The patch reminds us of some important points in security-related programming. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

‘Anatomy of an Anonymous Attack’ laid bare by Imperva

February 29, 2012 Author: Category: Greg's Blog

Security firm Imperva has published a detailed analysis of an attack by Anonymous on one of its customers, providing new insight into how the hacktivist group operates, and highlighting the need for better application layer security. According to The New York Times, the target in question was the Vatican, although…

read more

Anatomy of an Attack comes to Portland, OR

February 15, 2012 Author: Category: Greg's Blog

Anatomy of an Attack comes to Portland, OR (PDX) March 14, 2012. Learn about the latest security threats, see a live malware demo and more. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Anatomy of an Attack comes to Brisbane, Queensland

October 5, 2011 Author: Category: Greg's Blog

Live in the Brisbane, Queensland area? Join us for Anatomy of an Attack on 13 October 2011. Live elsewhere? Find out more about AoA events in your region, and check out our educational online videos. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved