Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Samsung says its mobile payments data is safe despite hack

October 10, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Samsung Electronics has said its mobile payment system is safe after a hacking attack against its US-based subsidiary LoopPay. An article in the New York Times on Wednesday said the hacking incident had occurred against LoopPay’s network in March. LoopPay, acquired…

read more

British spies tapping ‘Smurf’ tech to hack phones claims Snowden

October 6, 2015 Author: Category: Greg's Blog

Snowden claims British agencies are spying on your phone using programme codenamed ‘Smurfs’ Fugitive U.S. intelligence contractor Edward Snowden on Monday claimed that British spies are are tapping into our telephones and can even switch them on and off remotely as a way of keeping track of our every move….

read more

Does China’s government hack US companies to Rob secrets?

October 5, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans This week, Chinese President Xi Jinping is making his first official visit to the US. It takes place against a background of accusations flung by both the US and China over state-backed hacking. On Monday this week, a US national security…

read more

5.6M fingerprints stolen in US personnel data hack: government

September 28, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Hackers who stole security clearance data on millions of Defense Department and other U.S. government employees got away with about 5.6 million fingerprint records, some 4.5 million more than initially reported, the government said on Wednesday. During an ongoing analysis of…

read more

Does China’s government hack US companies to steal secrets?

September 25, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans This week, Chinese President Xi Jinping is making his first official visit to the US. It takes place against a background of accusations flung by both the US and China over state-backed hacking. On Monday this week, a US national security…

read more

Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones

September 24, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans REMOTE MANAGEMENT SYSTEMS for mobile phones are supposed to make it easy for companies to wipe a device clean if it gets lost or stolen. But a vulnerability discovered in a popular remote management system used by thousands of businesses to…

read more

85 legitimate iPhone apps that were infected with malware in the big App Store hack

September 23, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Apple fans have been criticizing Android for years, fighting back against “walled garden” claims by suggesting that Android’s open nature makes it far more susceptible to hacks and malware. This is indeed often the case, but if you thinkApple’s closed iOS…

read more

Kid cyber conferences allow them to “Go hack yourself”

September 22, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans “My primary goal of hacking was the intellectual curiosity, the seduction of adventure.” – Kevin Mitnick “A white-hat hacker is someone who enjoys thinking of innovative new ways to make, break and use anything to create a better world.” – Nico…

read more

Chinese computer hack attacks slow ahead of Obama summit: experts

September 22, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Major intrusions by Chinese hackers of U.S. companies’ computer systems appear to have slowed in recent months, private-sector experts say, ahead of a meeting between China’s president and President Barack Obama with cyber security on the agenda. Three senior executives at…

read more

Hackers exploit ‘Security flaw’ in iOS App to hack WeChat

September 19, 2015 Author: Category: Greg's Blog

WeChat hacked through ‘security flaw’ in iOS App, no user data or money stolen The popular messaging app, WeChat, which has over 600 million users was hacked through a security flaw said Tencent on Friday. However, it has been patched since then. After a preliminary investigation, the company said that no…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved