Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Tesla Looking to Recruit Hackers to Strengthen its Cars Against Cyber-Attacks

August 11, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans During the annual Def Con event this past Saturday in Las Vegas, carmaker Tesla recruited hackers in the event in an effort to protect its vehicles from possible cyber-attacks. This news comes after the exposure of how vulnerable to hacking automobiles…

read more

I Watched Hackers Pull Off A Real Life Ocean’s 11 Heist

August 11, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The scene was set: a surveillance camera, a safe full of money in a Las Vegas casino, a pair of thieves with lock picking tools and a laptop. I watched in awe as the skinny geeks clipped wires and rewired the…

read more

US hackers busily engaged in cyber espionage: American foreign policy analyst

August 10, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans An American foreign policy analyst says cyber espionage, cyber hacking is a very lively field of modern governments, and that US hackers are also busily engaged in such activities. James George Jatras, a former US diplomat and adviser to the Senate…

read more

News from DEF CON 23: fake deaths, DHS and Tesla court hackers

August 10, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans DEF CON wraps up its 23rd year in Las Vegas today, and the first wave of news reports show the notorious hacker conference’s non-technical and sensational talks grabbing the first round of headlines. As closing ceremonies wrap up, media reports about…

read more

Carphone Warehouse hackers gain access to millions of customer bank details

August 10, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Hackers have gained access to the personal details of 2.4 million people after cracking into Carphone Warehouse’s systems, the company has admitted. It announced that the IT systems of one of its UK divisions were found to have been breached on…

read more

Hackers broadcast porn on TV screens at Brazil bus depot

August 10, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans SAO PAULO (AFP) – Hackers infiltrated the travel information video screens at a Brazilian bus station and replaced arrival and departure times with hard-core porn. The sex footage ran for 15 minutes Friday evening at the Boqueirao station in the southern…

read more

Automakers trying to prevent hackers from commandeering cars

August 7, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans DETROIT (AP) – When researchers at two West Coast universities took control of a General Motors car through cellular and Bluetooth connections in 2010, they startled the auto industry by exposing a glaring security gap. Five years later, two friendly hackers…

read more

Comcast makes it ridiculously easy for hackers to access your email

August 7, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Have you read the bestselling book “The Martian”? There’s a movie coming out about it starring Matt Damon. The author of the book just had a nightmare experience when hackers took over his email account. Apparently Comcast made it very easy…

read more

Hackers Could “Harvest” Fingerprints From Android Phones

August 6, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans As fingerprint authentication becomes more commonplace, two hackers have claimed that they have figured out how a compromised Android could be used to collect fingerprint data from unsuspecting users. ZD Net reports that FireEye researchers Tao Wei and Yulong Zhang are…

read more

Hackers can remotely lift fingerprints from Android devices, but not Apple’s Touch ID

August 5, 2015 Author: Category: Greg's Blog

The annual Black Hat Security Conference offers a chance for hackers and security gurus to gather and share their latest finds. With a number of new smartphones having been announced over the past week and more on the way very shortly, Black Hat might have slipped under your radar. For…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved