Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Arrest of Tennessee children exposes flawed juvenile justice – Education Week

May 13, 2016 Author: Category: Greg's Blog

View full post on Education Week: Bullying #pso #htcs #b4inc Read More The post Arrest of Tennessee children exposes flawed juvenile justice – Education Week appeared first on Parent Security Online. View full post on Parent Security Online

read more

RSA brushes off crypto research findings that RSA algorithm is flawed

February 17, 2012 Author: Category: Greg's Blog

RSA says researchers’ results don’t indicate a fundamental flaw in the RSA algorithm but more likely a problem with implementing it After having its flagship RSA crypto system called flawed this week by prominent researchers in a paper they made available online, EMC’s RSA security division struck back by saying…

read more

RSA security flawed say researchers after collecting duplicate public keys

February 15, 2012 Author: Category: Greg's Blog

Cryptography researchers collected millions of X.509 public key certificates that are publicly available over the web and found what they say is a shockingly high frequency of duplicate RSA-moduli keys. “We performed a sanity check of public keys collected on the web,” the researchers state in their paper, published today…

read more

Google Wallet security flawed, reveals blogger

February 11, 2012 Author: Category: Greg's Blog

The Smartphone Champ blog has publicised a major security flaw within Google Wallet that can give hackers access to your Google Prepaid Card through the simple act of resetting your PIN. The blog discovered the flaw when it noticed that the Google Wallet Prepaid Card is not connected to a…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved