Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

2012-03-22 – High Schoolers from Around the Nation Compete for Chance to Become Cyber Security Superstars

March 23, 2012 Author: Category: Greg's Blog

High Schoolers from Around the Nation Compete for Chance to Become Cyber Security Superstars View full post on SANS Press Room View full post on National Cyber Security » Announcements

read more

How Google got around Apple’s Safari privacy protection

February 20, 2012 Author: Category: Greg's Blog

Jonathan Mayer, a graduate student at Stanford, caused a major stir this morning when he published research showing how Google used loopholes within Apple’s Safari browser cookie-blocking policy to place unexpected third party cookies within the browser. In this article we’ll detail Mayer’s findings and their implications for Safari users….

read more

Lookout’s New App Visualizes Mobile Security Threats As They Are Detected Around The World

January 24, 2012 Author: Category: Greg's Blog

Lookout, a company that offers security services for a number of smartphone platforms, is debuting a new Android app that lets you see mobile threats as they are detected around the world. Launched from Lookout Labs, the new app basically visualizes what’s happening in the mobile landscape and also shares…

read more

How to get around the Wikipedia blackout

January 18, 2012 Author: Category: Greg's Blog

There’s an easy way to get around Wikipedia’s blackout, using a tool which can also boost your online security. Find out how now. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

What you ask people walking around inside your company offices without a valid identity card: “May I help you?”

January 14, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

Don’t Play Around with Card Phone Scams

January 11, 2012 Author: Category: Greg's Blog

Credit card thieves are getting more sophisticated, but it's easy for consumers to out smart them. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security

read more

Don’t plug in USB drives that you find lying around. Criminals can use them to steal your data

December 18, 2011 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

How cyber thieves are getting around online security questions

November 8, 2011 Author: Category: Greg's Blog

Your online identity is protected by passwords and security questions but thieves are getting creative when it comes to getting around that. As one Valley woman learned you could be handing them the tools without even realizing it. View full post on bank security hacker – Yahoo! News Search Results…

read more

HTCS1: A Chinese hacker allegedly targeted companies around the world. Facebook steps up its cyber security. Listen to more http://t.co/tsWa9fgE

November 1, 2011 Author: Category: Greg's Blog

HTCS1: A Chinese hacker allegedly targeted companies around the world. Facebook steps up its cyber security. Listen to more http://t.co/tsWa9fgE View full post on Twitter / HTCS1 Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime

read more

HTCS1: One report says that a Chinese hacker has targeted companies around the world. Read more at http://t.co/5wbSIJLT

November 1, 2011 Author: Category: Greg's Blog

HTCS1: One report says that a Chinese hacker has targeted companies around the world. Read more at http://t.co/5wbSIJLT View full post on Twitter / HTCS1

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved