Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Edmonton babysitter charged with child exploitation

November 30, 2015 Author: Category: Greg's Blog

A man operating as an Edmonton babysitter for 16 years is facing child

read more

Ashton Kutcher launches tech lab to fight child sexual exploitation

November 16, 2015 Author: Category: Greg's Blog

These are some of the most common ways that kids are exploited every day online. Ashton Kutcher learned about the disturbing trend years ago after watching a Dateline special about exploited children in Cambodia. After digging into the issue, he realized that this wasn’t geographically isolated. It was happening “way…

read more

Manga warns Taiwanese children of sexual exploitation dangers

October 30, 2015 Author: Category: Greg's Blog

Ten thousand copies of a Japanese manga translated into Chinese to warn children against the dangers of sexual exploitation were presented to the Taipei city government’s Department of Education on Oct. 27. The Rotary Club of Taipei North translated and published the manga for distribution in junior high and senior…

read more

SHOCKING CLAIM IN SABRINA DAVIS’S CHILD EXPLOITATION ARREST REPORT

October 21, 2015 Author: Category: Greg's Blog

They simply state that Davis is accused of having sexually exploitative material on her cell phone, with victims including a nine-year-old and a six-year-old. But the accusations surrounding the discovery of the images, as detailed in a probable cause statement, are extraordinarily shocking — and may disturb some readers. They…

read more

ICE turns to Swedish software company for help investigating child exploitation materials

October 1, 2013 Author: Category: Greg's Blog

Jacob Goodwin Top Priority Sector:  law_enforcement_first_responders Read More…. View full post on The Cyber Wars

read more

TheHackersNews: RT @Security_FAQs: RedKit Exploit Kit : New web malware exploitation pack http://t.co/l8XapohQ

May 6, 2012 Author: Category: Greg's Blog

TheHackersNews: RT @Security_FAQs: RedKit Exploit Kit : New web malware exploitation pack http://t.co/l8XapohQ View full post on Twitter / TheHackersNews View full post on National Cyber Security

read more

M86 Security discover fragmented AJAX-based Web exploitation attacks

January 7, 2012 Author: Category: Greg's Blog

Security researchers from Web filtering vendor M86 Security have detected Web exploitation attacks that use AJAX (Asynchronous JavaScript and XML) to fragment the payload into small pieces of code that are harder to detect by antivirus programs and intrusion prevention systems. “The attack was observed on a currently running server…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved