Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Dead Space 2 [Part 8]: Hunter becomes the hunted…

August 29, 2013 Author: Category: Greg's Blog

He survived the incident aboard the Ishimura. He survived the Space Butt attack on Aegis VII. But they just wouldn’t leave Isaac Clarke alone… Now the engi… ___________________________ Read More…. View full post on Select From Our Menu

read more

Apple Mac user logins hunted by Flashback.G Trojan

February 25, 2012 Author: Category: Greg's Blog

Apple Mac users have been warned to be on the lookout for a new variant of the Flashback Java Trojan that has already hit an unknown number of victims running OS X 10.6 Snow Leopard. The new Flashback.G documented by Mac security company Intego shows an interesting development in the…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved