Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Keep smartphones backdoor free, urges cybersecurity expert Susan Landau

July 12, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans After years of debate on whether to give the FBI and other federal agencies the tools to bypass smartphone security, it appears we are still light-years away from any resolution. There was a moment a few months ago when proposed legislation…

read more

RESEARCHERS SOLVE JUNIPER BACKDOOR MYSTERY; SIGNS POINT TO NSA

December 25, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans “Although the party behind the Juniper backdoor could be the NSA or an NSA spying partner like the UK or Israel, news reports last week quoted unnamed US officials saying they don’t believe the US intelligence community is behind it, and…

read more

Apple may face fines as it is refusing backdoor access to data

September 13, 2015 Author: Category: Greg's Blog

United States may fine Apple for refusing to create backdoor for data access Apple may face problems same as Yahoo faced in 2007 when it refused to participate in the PRISM program,which set a precedent for non-compliance with government demands. Apple may get in deep trouble as it has refused…

read more

New backdoor worm found attacking websites running Apache Tomcat

November 24, 2013 Author: Category: Greg's Blog

  Researchers have identified new self-replicating malware that infects computers running the Apache Tomcat Web server with a backdoor that can be used to attack other machines. Java.Tomdep, as the backdoor worm has been dubbed, is Java Servlet-based code that gives Apache Tomcat platforms malicious capabilities. It causes infected machines to maintain Internet…

read more

D-Link router flaw lets anyone login through “Joel’s Backdoor”

October 15, 2013 Author: Category: Greg's Blog

  Members of the embedded systems hacker collective /dev/ttys0 spend their time playing around with devices like home routers and set-top boxes. They like to see what interesting facts these devices’ proprietary hardware and firmware might reveal. Part of the hackers’ motivation is to get the devices to do things that the…

read more

Security engineer hides hacking device in laptop power supply to create network backdoor

June 23, 2013 Author: Category: Greg's Blog

You gotta love security geeks — they can make it so easy for you. At least, if you’re a black hat hacker. Network security engineer “Richee” posted complete details about how to make a tiny Raspberry Pi computer look like a ordinary laptop power brick, and then give himself a physical backdoor into…

read more

Barracuda moves to shutter backdoor access to its network gear

February 7, 2013 Author: Category: Greg's Blog

Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended for remote support. The company apologized to customers for its design decisions that led to…

read more

ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)

May 23, 2012 Author: Category: Greg's Blog

A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security

read more

ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)

May 23, 2012 Author: Category: Greg's Blog

A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Why Does ZTE’s Score M Have a Built-In Backdoor Hole?

May 19, 2012 Author: Category: Greg's Blog

The Chinese handset maker’s entry level Android smartphone can be taken over by anyone with a hard-coded password, and guess what&#151it’s been published on the Internet. View full post on PCMag.com Security … View full post on National Cyber Security

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved