Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Former US President Jimmy Carter evade NSA surveillance

March 25, 2014 Author: Category: Greg's Blog

Former US president Jimmy Carter has admitted that NSA even monitor it own officials. in a recent conversation with few Journalist Former USA president Jimmy carter said that he knows NSA moniter everything so he don’t use Email address for keeping in contact with foreign leader privately instead he use…

read more

M-Trends #2: Everything Old is New Again – Targeted Attackers Using Passive Backdoors to Evade Networks

May 17, 2012 Author: Category: Greg's Blog

Earlier this week, I talked about malware threats. Today, we’ll address a new trend.  Turns out the perpetrators of targeted attacks are pragmatic, and are happy to borrow techniques that are even a decade old. Trend #2 in M-Trends: An Evolving Threat is titled “Everything Old Is New Again,” and…

read more

Web-based malware use smart redirection to evade URL security scanners

April 10, 2012 Author: Category: Greg's Blog

Security researchers from antivirus vendor ESET have come across new Web-based malware attacks that try to evade URL security scanners by checking for the presence of mouse cursor movement. The new drive-by download attacks were spotted in the Russian Web space and don’t require user interaction to infect computers with…

read more

Malware authors adopt domain generation algorithms to evade detection

February 28, 2012 Author: Category: Greg's Blog

Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. DGAs are generally used as a fallback mechanism for sending instructions to infected computers when the hard-coded command and control…

read more

Malware Authors Expand Use of Domain Generation Algorithms to Evade Detection

February 27, 2012 Author: Category: Greg's Blog

Malware authors are increasingly adopting flexible domain generation algorithms (DGAs) in order to evade detection and prevent their botnets from being shut down by security researchers or law enforcement agencies. DGAs are generally used as a fallback mechanism for sending instructions to infected computers when the hard-coded command and control…

read more

Evolving Malware Shows How Evil Apps Will Evade Detection

February 7, 2012 Author: Category: Greg's Blog

Just a few days after Google announced new safeguards against malicious apps in its Android Market, one researcher is already offering a helpful reminder that the mobile malware cat-and-mouse game is just getting started. Last Friday, North Carolina State University professor Xuxian Jiang wrote on his blog that his team…

read more

Evolving Malware Shows How Evil Apps Will Evade Detection

February 7, 2012 Author: Category: Greg's Blog

Just a few days after Google announced new safeguards against malicious apps in its Android Market, one researcher is already offering a helpful reminder that the mobile malware cat-and-mouse game is just getting started. Last Friday, North Carolina State University professor Xuxian Jiang wrote on his blog that his team…

read more

Evolving Android Malware Shows How Evil Apps Will Evade Google’s Scans

February 7, 2012 Author: Category: Greg's Blog

Just a few days after Google announced new safeguards against malicious apps in its Android Market, one researcher is already offering a helpful reminder that the mobile malware cat-and-mouse game is just getting started. Last Friday, North Carolina State University professor Xuxian Jiang wrote on his blog that his team…

read more

Android malware uses server-side polymorphism to evade detection

February 4, 2012 Author: Category: Greg's Blog

Adrian Kingsley-Hughes is an internationally published technology author who has devoted over a decade to helping users get the most from technology — whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or…

read more

Los Angeles airport terminal closed for 45 minutes after man tries to evade security

November 2, 2011 Author: Category: Greg's Blog

LOS ANGELES — A busy terminal at Los Angeles International Airport was shut down for nearly an hour Wednesday morning after a man reportedly tried to evade security. Transportation Safety Administration spokesman Nico Melendez says what could have been drug paraphernalia was spotted in the man’s carry-on bag at around…

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved