Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Chinese hackers ‘had full control’ over Nasa lab that commands 23 spacecraft

March 7, 2012 Author: Category: Greg's Blog

Chinese hackers had 'full access' to the computer network in one of Nasa's key laboratories, the Jet Propulsion Laboratory, allowing them to steal information and even upload hacking software. View full post on hacking tools – Yahoo! News Search Results View full post on National Cyber Security

read more

Hacker threatens to release full Norton Antivirus code on Tuesday

January 17, 2012 Author: Category: Greg's Blog

A hacker who goes by the name of “Yama Tough” threatened Saturday to release next week the full source code for Symantec Corp’s flagship Norton Antivirus software. “This coming Tuesday behold the full Norton Antivirus 1,7Gb src, the rest will follow,” Yama Tough posted via Twitter. In the past week…

read more

Hackers threaten Symantec with full source code release

January 16, 2012 Author: Category: Greg's Blog

The hacking collective that spent recent days revealing fragments of the source code to Symantec’s Norton AntiVirus (NAV) has threatened to release code for the whole program. Using the group’s Twitter feed, ‘Yama Tough’ said the release would happen this Tuesday (17 January) with the message “this comming (sic) tuesday…

read more

Hacker says to release full Norton Antivirus code on Tuesday (Reuters)

January 14, 2012 Author: Category: Greg's Blog

Reuters – A hacker who goes by the name of ‘Yama Tough’ threatened Saturday to release next week the full source code for Symantec Corp’s flagship Norton Antivirus software. View full post on Yahoo! News: Security News View full post on National Cyber Security

read more

2012 resolution: ‘Full disk encryption on all computers’

January 3, 2012 Author: Category: Greg's Blog

The privacy rights group is preaching the gospel of encryption in 2012, making the case that whole disk encryption can go a long way to protecting private data on computers. View full post on computer forensic – Yahoo! News Search Results View full post on National Cyber Security

read more

Macy’s Chesterfield Mall, Chesterfield, MO: Loss Prevention/Security Detective, Full Time

December 27, 2011 Author: Category: Greg's Blog

Job TitleMacy’s Chesterfield Mall, Chesterfield, MO: Loss Prevention/Security Detective, Full Time DivisionMacy’s LocationChesterfield, Mo 63017 StatusFull Time, Employee Job CategorySecurity/Protective Services View full post on National Cyber Security

read more

ProtectMyID: Consider the risks of making your full name and full birthdate public online. #identitytheft #cybersecurity

November 10, 2011 Author: Category: Greg's Blog

ProtectMyID: Consider the risks of making your full name and full birthdate public online. #identitytheft #cybersecurity View full post on Twitter / ProtectMyID View full post on National Cyber Security Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime

read more

Speech in full – Jim Murphy

November 9, 2011 Author: Category: Greg's Blog

We are living through an important moment for defence policy. View full post on germany cyber attack – Yahoo! News Search Results View full post on National Cyber Security

read more

– Macy’s The Promenade Bolingbrook, Bolingbrook, IL: Loss Prevention/Security Detective, Full Time

July 6, 2011 Author: Category: Greg's Blog

Job Title– Macy’s The Promenade Bolingbrook, Bolingbrook, IL: Loss Prevention/Security Detective, Full Time DivisionMacy’s Stores LocationBolingbrook, IL 60439 StatusFull Time, Employee Job CategorySales/Retail/Business Development View full post on National Cyber Security

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved