Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Romanian hacker Guccifer says US allegation against Russia are part of “fake cyber war”

January 7, 2017 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Famous Romanian hacker Guccifer, who is currently serving time in Romania for having hacked some e-mail accounts of important political figures and celebrities, spoke to a Fox News journalist about the latest diplomatic tensions between the U.S. and Russia. During The…

read more

Teen leader of hackers who made fake 911 threats pleads guilty

December 9, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans An Andover teenager who led a group of hackers who made fake threats nationwide has pleaded guilty and been sentenced to juvenile detention. The 17-year-old, whose name was not released, was ordered into the custody of the Department of Youth The…

read more

Hackers use typosquatting to dupe the unwary with fake news, sites

December 2, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The proliferation of fake news has shone a light on another murky corner the web, the practice of typosquatting. These are the URLs that pass for common ones — say Amazoon.com instead of Amazon.com — if the user isn’t paying The…

read more

Noisy Fans & Fake Deli Coupons: How Hackers are Winning Now

October 6, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans In the race to come up with new and more sophisticated ways to invade victims’ computers and networks, hackers will use any means necessary – even a computer’s fan. Especially designed for highly secure computers that aren’t even on a The…

read more

Hackers Use Google’s Ad Network To Spread “Fake Login” Malware

August 17, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers. In the past year, a similar threat has begun to emerge on mobile devices: So-called overlay malware that impersonates The…

read more

FBI kids camp to teach cybersecurity ends with fake guns drawn, mock arrest

July 26, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The FBI partnered with their local chapter of Infragard to offer a summer camp for kids. The middle schoolers who participated got a pretty unique first hand look at how the FBI solves crimes. The kids started the day with an…

read more

Users sign away their firstborns on fake social network

July 15, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans We already know that people are willing to hand over their firstborns for free Wi-Fi. Or, at least, they’re more willing to accidentally sign over perpetual ownership of their tots than they are to read lengthy terms and conditions. We know…

read more

China says to crackdown on fake news from social media

July 4, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans China’s internet regulator will launch a crackdown on the reporting of news gathered from social media, as part of what the government calls a campaign against fake news and the spreading of rumours. In a statement late on Sunday, the Cyberspace…

read more

Fraudsters using fake letterboxes for identity theft scams

July 1, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Identity scammers are using fake mailboxes to “harvest” householders’ mail and then using the stolen details to gain credit. The fake letterboxes are attached to the exterior of properties to fool postal workers and are then removed before residents notice their…

read more

Hackers Create a Fake WhatsApp ‘Gold Version’ to get Into Your System

June 8, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The ingenuity of black hat hackers doesn’t fail to impress, if only it was used for good. So what is the latest attempt by said hackers to get into your system? This time around they have created a “Gold Version” of…

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved