Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Calling service helps cybercriminals extract sensitive info

November 9, 2011 Author: Category: Greg's Blog

IDG News Service – Researchers from security vendor Trusteer have come across a professional calling service that caters to cybercriminals. The business offers to extract sensitive information needed for bank fraud and identity theft from individuals. The security company spotted an advertisement for making on-demand calls in English and other…

read more

New Android malware uses blog platform to communicate with cybercriminals

October 7, 2011 Author: Category: Greg's Blog

Trend Micro Inc. has uncovered a new Android malware variant that uses a blog site with encrypted content as its command-and-control server and disguises itself as an e-book reader app. <img alt="New Android malware uses blog platform to communicate with cybercriminals, Blog, malware, Android, Blog, uses, Cybercriminals, Platform, communicate"height="0" width="0"…

read more

Cybercriminals trick Windows users into paying £88 in “ransomware” scam

September 7, 2011 Author: Category: Greg's Blog

Cybercriminals are trying to trick Windows users into paying £88 ($143) by claiming that they’re running a counterfeit copy of the operating system, a security expert said today. The scam, a kind dubbed “ransomware” for the way criminals try to extort money, poses as a message from Microsoft that alleges…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved