Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Researchers Release New Exploits to Hijack Critical Infrastructure

April 5, 2012 Author: Category: Greg's Blog

New attack code that can be used to take over the control systems of refineries, power plants and factories has been released into the wild. The purpose? To push vendors to take security seriously. View full post on computer worm – Yahoo! News Search Results View full post on National…

read more

Boston-Based Arsenal Consulting Finds New Evidence of Electronic Forgery in Critical Turkish Coup Plot Case

April 2, 2012 Author: Category: Greg's Blog

BOSTON, MA– – Arsenal Consulting , providers of exceptional computer forensics services that leverage powerful technologies and techniques to uncover smoking gun evidence, today announced they have found … View full post on computer forensic – Yahoo! News Search Results View full post on National Cyber Security

read more

Flash Player 11.2 fixes critical vulnerabilities and adds silent updates

March 30, 2012 Author: Category: Greg's Blog

Adobe have released Flash Player 11.2, addressing two critical arbitrary code execution vulnerabilities and introducing a silent update option. One of the patched vulnerabilities stems from how older versions of Flash Player checks URL security domains, and only affects the Flash Player ActiveX plug-in for Internet Explorer on Windows 7…

read more

Industrial Defender and Good Harbor Consulting Announce Critical Infrastructure Cyber Security Alliance

March 26, 2012 Author: Category: Greg's Blog

Industrial Defender, the leading global provider of security, compliance and change management solutions for automation systems, and Good Harbor Consulting, a leading provider of g View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

Critical windows bug makes worm-meat of millions of high-value machines

March 14, 2012 Author: Category: Greg's Blog

Microsoft has plugged a critical hole in all supported versions of Windows that allows attackers to hit high-value computers with self-replicating attacks that install malicious code with no user interaction required. The vulnerability in the Remote Desktop Protocol is of particular concern to system administrators in government and corporate settings…

read more

Critical Windows bug could make worm meat of millions of high-value machines

March 14, 2012 Author: Category: Greg's Blog

Microsoft has plugged a critical hole in all supported versions of Windows that allows attackers to hit high-value computers with self-replicating attacks that install malicious code with no user interaction required. The vulnerability in the Remote Desktop Protocol is of particular concern to system administrators in government and corporate settings…

read more

Six bulletins, one critical, expected for March 2012 Patch Tuesday

March 9, 2012 Author: Category: Greg's Blog

Microsoft?s March bundle of updates repairs seven vulnerabilities, including a critical Windows flaw. View full post on SearchSecurity: Security Wire Daily News View full post on National Cyber Security

read more

New US cybersecurity act could be costly for some critical system vendors

February 18, 2012 Author: Category: Greg's Blog

Leaders in the US Senate are trying to fast-track new cybersecurity legislation that will create costly new regulations for some businesses, some critics said Thursday. A plan by Senate Democrats to move the Cybersecurity Act, introduced this week, directly to the Senate floor for a vote raises serious questions about…

read more

New US cybersecurity act could be costly for some critical system vendors

February 18, 2012 Author: Category: Greg's Blog

Leaders in the US Senate are trying to fast-track new cybersecurity legislation that will create costly new regulations for some businesses, some critics said Thursday. A plan by Senate Democrats to move the Cybersecurity Act, introduced this week, directly to the Senate floor for a vote raises serious questions about…

read more

Senate Bill May Require ‘critical’ Networks to Adopt Cyber Standards

February 14, 2012 Author: Category: Greg's Blog

A bill in the U.S. Senate would require operators of so-called critical infrastructure networks to adopt cybersecurity practices if evaluations by the U.S… View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved