Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

I came away from my hands-on tour of Fable Legends thinking it could take over my life

August 6, 2015 Author: Category: Greg's Blog

I have a problem. Sometimes, games come along that are so addictive that I begin bending my life to accommodate them. The most recent game to enrapture me in this way was Elite: Dangerous. It starts innocently enough. You might lose an afternoon to it. Procrastinate on your hobby projects…

read more

Chinese Communist Party Media Posts Execution Photos Actually Came From Fetish Porn Site

August 30, 2013 Author: Category: Greg's Blog

Read More…. View full post on The Cyber Wars

read more

Its Been Time This Has Came!

July 16, 2013 Author: Category: Greg's Blog

Well here I am going to be a star on YouTube lol! ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

CBP looked to safety of its agents as Isaac came ashore and pushes through

August 31, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  disaster_preparedness_emergency_response Image Caption:  CBP’s Isaac ICP As Hurricane Isaac pounded the Gulf Coast region with drenching rains and 80 mile-per-hour winds the week of Aug. 27, U.S. Customs and Border Protection looked to ensure that its personnel manning ports of entry in the affected area…

read more

CBP looked to safety of agents as Isaac came ashore, pushes through

August 31, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  disaster_preparedness_emergency_response Image Caption:  CBP’s Isaac ICP As Hurricane Isaac pounded the Gulf Coast region with drenching rains and 80 mile-per-hour winds the week of Aug. 27, U.S. Customs and Border Protection looked to insure its personnel manning ports in the affected area were accounted for….

read more

The ultimate Android malware guide: What it does, where it came from, and how to protect your phone or tablet

March 24, 2012 Author: Category: Greg's Blog

Every week seems to bring word of a new threat for Android devices. But is the Android malware world really that bad? How can everyday user stay safe? Although it hasn’t made a huge dent in the tablet market yet — or perhaps we should call it the iPad market…

read more

Do agent-publishers carry a conflict of interest? – How agent-publishers came to be, and what they mean for the publishing world.

November 8, 2011 Author: Category: Greg's Blog

Booksquare’s Kassia Krozser discusses the emerging agent-publisher role, and why she’s concerned about a conflict of interest. View full post on O’Reilly News and Commentary View full post on National Cyber Security

read more

First came Stuxnet computer virus: now there’s Duqu (Reuters)

October 28, 2011 Author: Category: Greg's Blog

Reuters – First there was the Stuxnet computer virus that wreaked havoc on Iran’s nuclear program. Now comes “Duqu,” which researchers on Tuesday said appears to be quite similar. View full post on Yahoo! News: Security News View full post on National Cyber Security

read more

Email fraud came close to wrecking my life – and the charity I run

October 8, 2011 Author: Category: Greg's Blog

Margaret Owen’s Gmail account was hacked into and her friends asked to send money. Here she tells how a cyber-crime recently highlighted in Guardian Money almost wrecked her charity On the last day of our summer holiday in my Dorset cottage, my son shouted down the stairs “Mum, you’ve been…

read more

HTCS1: Thanks everyone that came out last week to NY IT Security Conference. Get inside scoop @ nationalcybersecurity.com.

September 28, 2011 Author: Category: Greg's Blog

HTCS1: Thanks everyone that came out last week to NY IT Security Conference. Get inside scoop @ nationalcybersecurity.com. View full post on Twitter / HTCS1

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved