Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

AWS credentials uncovered using Google Code Search

November 23, 2011 Author: Category: Greg's Blog

One mistake by a developer could expose an organization?s AWS infrastructure, security researcher says. View full post on hacking tools – Yahoo! News Search Results View full post on National Cyber Security

read more

Microsoft Excel BIFF Record Remote Code Execution Vulnerability

November 21, 2011 Author: Category: Greg's Blog

Security Information Risk Compliance Storage Infrastructure Operations Business Continuity Products A-Z Article source: http://www.symantec.com/business/security_response/vulnerability.jsp?bid=23760&om_rssid=sr-advisories View full post on National Cyber Security

read more

Credit card criminals seeks to elicit security code over the phone

November 16, 2011 Author: Category: Greg's Blog

Police are warning about a credit card scam that has the potential to trap unsuspecting victims. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on…

read more

F-Secure spots malware signed with real code certificate

November 16, 2011 Author: Category: Greg's Blog

Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid secure code signing certificate from a Malaysian governmental institution. A code signing certificate is a kind of digital signature that ensures the authenticity and integrity of an application to be run on a computer….

read more

New Duqu malware shares Stuxnet Trojan code similarities

November 3, 2011 Author: Category: Greg's Blog

Symantec Corp. researchers have revealed the presence of new malware that is strikingly similar to the dangerous Stuxnet Trojan, and could be a precursor to a future Stuxnet-style attack. Symantec Security Response researchers say Duqu (pronounced dyü-kyü), named because it creates files with the file name prefix “~DQ”, was first…

read more

11.41.6 Symantec IM Manager Code Injection

October 10, 2011 Author: Category: Greg's Blog

CVEs: CVE: CVE-2011-0554 Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security

read more

11.41.4 Citrix Provisioning Services Remote Code Execution

October 9, 2011 Author: Category: Greg's Blog

CVEs: CVE: Not Available Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security

read more

11.38.15 Wireshark Lua Script File Arbitrary Code Execution

September 16, 2011 Author: Category: Greg's Blog

CVEs: CVE: Not Available Platform: Cross Platform View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security

read more

Ripoff Report Strikes Back: Removes Code on Site Left by Hacker

August 22, 2011 Author: Category: Greg's Blog

The Ripoff Report has struck back against the so-called reputation management companies that claim to be able to remove posts about companies on the RipoffReport.com website. In a recent press release, Ripoff Report claims that they have removed code on their website that was left by a hacker hired by…

read more

Code reveals your Facebook stalking victims

August 18, 2011 Author: Category: Greg's Blog

There is a way to find out whose Facebook pages you loiter on most — a bit of code that ranks people according to who you’re most likely to search for. But you may be surprised by the results. View full post on firefox hacker – Yahoo! News Search Results…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved