Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

A hacker found another bug on the White House’s Medium blog

November 17, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The White House had an unexpected surprise on Tuesday when a hacker discovered and used a bug on publishing platform Medium to add himself as a writer to The White House’s blog. Medium.com/@WhiteHouse is increasingly used as a major publishing The…

read more

In three bipartisan votes, Houses passes three security-related measures

December 4, 2013 Author: Category: Greg's Blog

Top Priority Sector:  federal_agencies_legislative Image Caption:  Rep. Michael McCaul Read More…. View full post on The Cyber Wars

read more

Italy – Rome: Prostitution Houses

September 23, 2013 Author: Category: Greg's Blog

___________________________ Read More…. View full post on Select From Our Menu

read more

Johns Hopkins lands FEMA contract to enhance preparedness at houses of worship

September 17, 2013 Author: Category: Greg's Blog

Jacob Goodwin Top Priority Sector:  disaster_preparedness_emergency_response Image Caption: Read More…. View full post on The Cyber Wars

read more

Suspect in theft from Mission Houses Museum rejects plea offer

January 3, 2012 Author: Category: Greg's Blog

A former bookkeeper who city prosecutors say confessed to stealing about $50,000 from the Mission Houses Museum in Honolulu rejected… View full post on computer theft – Yahoo! News Search Results View full post on National Cyber Security

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved