Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Trojan Exploits Known Hole in Microsoft Office (February 9, 2012)

February 16, 2012 Author: Category: Greg's Blog

Wow! It’s an incident handler’s Christmas morning, tools, tools, tools. Very Applicable! -Todd Davis, Symantec Article source: http://www.sans.org/newsletters/newsbites/newsbites.php?vol=14&issue=13&rss=Y#sID309 View full post on National Cyber Security

read more

Mozilla patches ‘critical’ Firefox security hole

February 12, 2012 Author: Category: Greg's Blog

Mozilla rates this a "critical" vulnerability that can be used to run attacker code and install software, requiring no user interaction beyond normal browsing. View full post on firefox hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

HP Plugs Security Hole With LaserJet Firmware Update, Says No Record Of Printers Set Ablaze By Hackers

December 25, 2011 Author: Category: Greg's Blog

Remember when researchers claimed a massive security vulnerability could potentially enable hackers to remotely take over Hewlett-Packard LaserJet printers and even cause them to burst into flames? Fun times, for sure. Of course, HP was quick to point out that the researchers had it all wrong, lamented the “sensational and…

read more

Microsoft fixes Duqu hole, but not BEAST problem

December 13, 2011 Author: Category: Greg's Blog

Microsoft pulls patch to protect IE users from flaw in SSL protocol after running into compatibility issue. View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Apple’s OS X sandbox has a gaping hole – or not

November 14, 2011 Author: Category: Greg's Blog

Argentinian security researchers have publicised what they call a hole in Apple’s OS X sandbox. Apple says the sandbox is, strictly speaking, doing what it says on the tin. The rest of us can’t actually see what it says on the tin – so who’s right? View full post on…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved