Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Apple OS X users – it’s Security Update time again!

February 1, 2012 Author: Category: Greg's Blog

Apple’s latest large-scale OS X security updates are out. In tech-speak, there are 39 fixes, covering 52 CVE identifiers, and including 19 fixes for vulnerabilities potentially allowing arbitrary code execution. That’s a lot! View full post on Naked Security – Sophos View full post on National Cyber Security

read more

PS3, Apple hacker ditches Facebook for Lady Gaga

January 27, 2012 Author: Category: Greg's Blog

A hacker who got into trouble with Sony and Apple then went 'straight' and joined Facebook has returned to hacking, a business news site reported. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Apple malware became more sophisticated in 2011

January 26, 2012 Author: Category: Greg's Blog

Malware aimed at Macs is still insignificant compared to Windows but Apple users should to pay careful attention to the growing threat from social engineering attacks, a report has found. The Year in Mac Security by Apple security company Intego divides 2011 into two halves before and after the day,…

read more

Fake iPhone app snuck through Apple approval process

January 24, 2012 Author: Category: Greg's Blog

Apple let a fake app slip through its approval process for the iOS App Store, the makers of the popular Camera+ program said over the weekend. Security researchers who noted the slip-up did not know whether the bogus app contained malware because they had been unable to grab a copy…

read more

Apple iPad 2 and iPhone 4S finally fall to jailbreakers

January 22, 2012 Author: Category: Greg's Blog

Apple’s most hacker-resistant hardware to date – the iPad 2 and the iPhone 4S, which are built around the Apple A5 chip – can now be jailbroken. Should you rush to slither free of Apple’s fiscal tentacles? View full post on Naked Security – Sophos View full post on National…

read more

Apple desktops see jump in security threats in 2011

January 21, 2012 Author: Category: Greg's Blog

New Mac-based security threats jumped in 2011, but still remain far below that of Windows PCs, according to a report by F-Secure Labs. A total of 58 unique variants were detected from April through December, according to the Labs’ Threat Research team. Nearly half, 29, were Trojan downloaders, which F-Secure…

read more

Twin Cities man sues Apple, AT&T over data monitoring

January 21, 2012 Author: Category: Greg's Blog

In the federal lawsuit, George Howell is alleging that his personal cellphone data on his iPhone were tracked. View full post on cellphone security – Yahoo! News Search Results View full post on National Cyber Security

read more

Could Apple power cables help you remember your passwords?

January 7, 2012 Author: Category: Greg's Blog

A new patent from Apple shows how a power cable could help users access their computing devices when they forget their passwords – and perhaps improve security. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Apple Customers Targeted by Phishing Campaign

December 27, 2011 Author: Category: Greg's Blog

According to Intego researchers, the campaign tries to trick victims into disclosing their credit card information. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Report: Phishing attack targets Apple customers

December 26, 2011 Author: Category: Greg's Blog

An email posing as one from Apple is making the rounds, attempting to steal users’ credit-card information. View full post on phishing – Yahoo! News Search Results View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved