Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

TheHackersNews: RT @securityshell: Remote code execution on Apache with PHP in CGI mode http://t.co/oH4VW1xO

May 5, 2012 Author: Category: Greg's Blog

TheHackersNews: RT @securityshell: Remote code execution on Apache with PHP in CGI mode http://t.co/oH4VW1xO View full post on Twitter / TheHackersNews View full post on National Cyber Security

read more

Un-Patched PHP-CGI remote code execution vulnerability can expose Source Codes

May 3, 2012 Author: Category: Greg's Blog

Un-Patched PHP-CGI remote code execution bug can expose Source Codes A serious remote code execution vulnerability in PHP-CGI disclosed. PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. The developers were still in the process of … View full post on National Cyber Security » Computer Hacking

read more

2010-02-17 – New Top 25 Programming Errors Opens Door to Shift Liability for Faulty Code from Buyers to Developers

May 3, 2012 Author: Category: Greg's Blog

New Top 25 Programming Errors Opens Door to Shift Liability for Faulty Code from Buyers to Developers View full post on SANS Press Room View full post on National Cyber Security » Announcements

read more

Facebook source code hacker explains,what really happened !

May 2, 2012 Author: Category: Greg's Blog

Software development student Glenn Mangham, 26, was freed earlier this month after appeal judges halved the eight-month prison sentence he was given for infiltrating and nearly bringing down the multi-million-dollar site.<!– adsense –> Glenn Mangham, of … View full post on National Cyber Security » Computer Hacking

read more

Not Much Hyperventilating Over Hacker’s Hypervisor Code Theft

May 1, 2012 Author: Category: Greg's Blog

A hacker with the handle "Hardcore Charlie" has stolen source code for VMware's ESX hypervisor and posted it on the Internet. A hypervisor provides a virtualization layer between operating systems and the underlying hardware, creating … View full post on National Cyber Security » Computer Hacking

read more

[webapps] – WebCalendar 1.2.4 Pre-Auth Remote Code Injection

April 29, 2012 Author: Category: Greg's Blog

WebCalendar 1.2.4 Pre-Auth Remote Code Injection View full post on Exploit-DB updates View full post on National Cyber Security

read more

Hacker Looking For US Military Documents Finds VMWare Source Code

April 28, 2012 Author: Category: Greg's Blog

Michael Harper for RedOrbit.com Members from the hacktivist group “LulzSec” are at it again, as source code from VMWare’s ESX hypervisor technology has been leaked to a website used to anonymously host hacked files. According to a company blog , VMWare has said a “single file” from their ESX source…

read more

VMware virtualisation source code stolen, but impact unclear

April 26, 2012 Author: Category: Greg's Blog

VMware ESX source code has been stolen and posted online, but the company says its virtualisation platform doesn’t necessarily pose an increased risk to customers. The stolen code amounts to a single file from sometime around 2003 or 2004, the company said. “The fact that the source code may have…

read more

Facebook source code hacker Glenn Mangham on ‘what really happened’

April 26, 2012 Author: Category: Greg's Blog

Glenn Mangham, the Facebook hacker who stole the social network’s source code, has gone public with a deeper explanation of how he penetrated the website. The 26-year-old student, of York, posted a lengthy writeup on his blog and a video, saying that he accepts full responsibility for his actions and…

read more

Amazon advises Android developers on how to protect code

April 19, 2012 Author: Category: Greg's Blog

Amazon Appstore for Android developers should consider obfuscating their code if they are concerned about their applications being reverse engineered, the company said yesterday. Obfuscating the code modifies the source and machine code to be difficult for a human to understand if the app gets decompiled, according to Amazon. For…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved