Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

California Attorney General Kamala Harris and Lookout issue small business cybersecurity guide

March 3, 2014 Author: Category: Greg's Blog

Top Priority Sector:  cyber_security Image Caption:  Kamala Harris  Read More…. View full post on The Cyber Wars

read more

Foreign stripper issue : Former sex slave applauds stripper visa ban – Canada

October 16, 2013 Author: Category: Greg's Blog

watch full video at http://vidjaa1.info It just got harder for foreigners to take their clothes off in Canada. In an effort it says is aimed at cracking down… ___________________________ Read More…. View full post on Select From Our Menu

read more

From the Magazine: The Growing Issue of Wireless Privacy

August 28, 2013 Author: Category: Greg's Blog

Recent unauthorized disclosures regarding the extent of National Security Agency (NSA) cellphone data gathering have a lot of Americans wondering just how much privacy we can expect in our personal communications. Perhaps even more significantly, the flap over NSA activities gives rise to a much broader issue of whether some…

read more

RAMCHARAN BODYGUARD FIGHT WITH SOFTWARE_CHARAN LIE ON FIGHT ISSUE

May 23, 2013 Author: Category: Greg's Blog

RAMCHARAN BODYGUARD FIGHT WITH SOFTWARE_CHARAN LIE ON FIGHT ISSUE. Read More…. View full post on Hip Hop Security

read more

Next Issue: Why I recommissioned my old iPad

December 14, 2012 Author: Category: Greg's Blog

I had to take my first-gen iPad out of mothballs for this one. I’m talking about the Next Issue service and app. Like most of you I’ve let my print magazine subscriptions lapse over the past several years. I spend … View full post on O’Reilly News and Commentary For…

read more

InfosecIsland: Strategic Web Compromises and Cyber Espionage Operations – “Cyber Espionage attacks are not a fabricated issue and a… http://t.co/b4XthxpV

May 15, 2012 Author: Category: Greg's Blog

InfosecIsland: Strategic Web Compromises and Cyber Espionage Operations – “Cyber Espionage attacks are not a fabricated issue and a… http://t.co/b4XthxpV View full post on Twitter / InfosecIsland View full post on National Cyber Security

read more

TheHackersNews: Hacktivism – The Hacker #News Magazine – May 2012 Issue http://t.co/RKLtM7kV #Security #THN #ebookdownload

May 6, 2012 Author: Category: Greg's Blog

TheHackersNews: Hacktivism – The Hacker #News Magazine – May 2012 Issue http://t.co/RKLtM7kV #Security #THN #ebookdownload View full post on Twitter / TheHackersNews View full post on National Cyber Security

read more

idtheftprotect: #Android NotCompatible Trojan is only an issue if you allow side-loading. Make sure “Unknown sources” is disabled :) http://t.co/IQU3ieWe

May 4, 2012 Author: Category: Greg's Blog

idtheftprotect: #Android NotCompatible Trojan is only an issue if you allow side-loading. Make sure “Unknown sources” is disabled http://t.co/IQU3ieWe View full post on Twitter / idtheftprotect View full post on National Cyber Security

read more

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email?

April 30, 2012 Author: Category: Greg's Blog

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email? View full post on Twitter / 2600 View full post on National Cyber Security

read more

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email?

April 30, 2012 Author: Category: Greg's Blog

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email? View full post on Twitter / 2600 View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved