Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Google in the gun as cyber hate victims fight back

April 1, 2012 Author: Category: Greg's Blog

Consumer complaint websites set up to name and shame become hotbed for hate attacks. View full post on cyber extortion – Yahoo! News Search Results View full post on National Cyber Security

read more

Using the internet lands ‘hacker’ back in prison

April 1, 2012 Author: Category: Greg's Blog

Mr Cleary, 19, is accused of being a member of the hacktivist group LulzSec as it carried out a series of attacks on targets including the UK’s Serious Organised Crime Agency, the CIA and News International. A court heard that he had contacted the former LulzSec leader Hector Xavier Monsegur…

read more

Mossad Cutting Back on Covert Operations Inside Iran, Officials Say

March 30, 2012 Author: Category: Greg's Blog

Israel’s intelligence services have scaled back covert operations inside Iran, ratcheting down by “dozens of percent” in recent months secret efforts to disable or delay the enemy state’s nuclear program, senior Israeli security officials tell TIME.  The reduction runs across a wide spectrum of operations, cutting back not only alleged…

read more

Hacker group back in action, exposes GI e-mail accounts

March 28, 2012 Author: Category: Greg's Blog

LOS ANGELES — The hacker group known as LulzSec appears to be back after many months of lying low, claiming to have exposed the e-mail accounts of nearly 171,000 members of the military. The group, which in 2011 went after government agencies and companies including the FBI, CIA, Sony and the…

read more

Remember that any email or instant message you send could come back to haunt you

March 22, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

LulzSec back on April 1, while Anonymous targets Imperva

March 22, 2012 Author: Category: Greg's Blog

LulzSec, six of whose members were arrested earlier this month, will resume hacker operations on April 1, while Anonymous declared independently security firm Imperva are one of their targets. “It’s ridiculous to believe that by arresting the six prime members of LulzSec that you have stopped us,” said the electronically…

read more

LulzSec Is Back; Anonymous Targets Imperva

March 21, 2012 Author: Category: Greg's Blog

Hacker collective LulzSec, six of whose members were arrested earlier this month, will resume active operation April 1, according to a video posted on YouTube. View full post on lulzsec hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

United Vision Marketing Firm Fights Back Against False Accusations on the Internet

March 7, 2012 Author: Category: Greg's Blog

NEW YORK — United Vision Marketing Firm announces today that the social and economic firm has had enough of false information posted on scam alert sites that somehow continues to get better SEO ranking … View full post on social media scam – Yahoo! News Search Results View full post…

read more

Hackers steal Michael Jackson back catalogue from Sony

March 6, 2012 Author: Category: Greg's Blog

Sony’s PlayStation Network major outage last year was not the only damage done by hackers. Michael Jackson’s entire back catalogue of more than 50,000 music files, worth some $250 million, was stolen as well, it has been revealed. The hack was traced to the UK, according to a report in…

read more

Trend Micro brings intrusion detection back from cloud with Deep Discovery

February 29, 2012 Author: Category: Greg's Blog

Trend Micro today announced Deep Discovery, a threat detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Deep Discovery is intended to focus on the question, “Is there human attacker activity in the network?” says Kevin Faulkner, senior enterprise…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved