Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data

October 29, 2014 Author: Category: Greg's Blog

In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…

read more

W3C drafts web standards to protect online privacy

November 16, 2011 Author: Category: Greg's Blog

The World Wide Web Consortium (W3C) has released the first draft of two standards intended to protect the privacy of web users and allow them to opt out of web tracking systems. The two draft standards are intended to “prevent surprises, to foster trust on the web” and to find…

read more

W3C drafts web standards to protect online privacy

November 16, 2011 Author: Category: Greg's Blog

The World Wide Web Consortium (W3C) has released the first draft of two standards intended to protect the privacy of web users and allow them to opt out of web tracking systems. The two draft standards are intended to “prevent surprises, to foster trust on the web” and to find…

read more

W3C drafts web standards to protect online privacy

November 16, 2011 Author: Category: Greg's Blog

The World Wide Web Consortium (W3C) has released the first draft of two standards intended to protect the privacy of web users and allow them to opt out of web tracking systems. The two draft standards are intended to “prevent surprises, to foster trust on the web” and to find…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved