­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

It’s out of the bag: Rugged CAT S50 coming to Verizon as the CAT S50c

September 4, 2015 Author: Category: Greg's Blog

If you’re a Verizon customer looking for a phone that can survive anything you throw at it, we have good news for you. The CAT S50 is just weeks away from being available for purchase by customers of the nation’s largest mobile carrier. The CAT S50 offers a shatterproof 4.7-inch…

read more

It’s the anniversary of the infamous iCloud sex hack, but cops are no closer to nailing the culprit

September 1, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Today is the first anniversary of the huge naked celebrity picture leak known as The Fappening, but cops have still not managed to arrest the pervy perpetrator. On this day last year, hundreds of graphic sexual pictures of stars including Jennifer…

read more

It’s official! Next-generation Apple iPhones to be unveiled September 9th

August 27, 2015 Author: Category: Greg's Blog

Perhaps after weeks of hearing speculation that Apple will unveil its next-generation iPhones on September 9th, today’s news is anti-climatic. Still,  Apple has just made the September 9th date official by sending out invitations to the event, which will be held in San Francisco. The new iPhone models, presumably named…

read more

Latest “If it’s not an iPhone” ad is all about Apple Pay

August 20, 2015 Author: Category: Greg's Blog

Apple’s “If it’s not an iPhone” series of ads has been trying to show consumers that not all smartphones are the same. While the tag line used for the ads does seem rather obvious, there are some people who are not as well-versed about intelligent handsets as our readers are….

read more

Rumor: LG’s has a second Nuclun chip; it’s faster than the Exynos 7420 SoC, specs and benchmarks show

August 17, 2015 Author: Category: Greg's Blog

Aiming to get to the level of Samsung, Apple, and Huawei, LG has also been making its baby steps on the chipset scene, aiming to design its own smartphone chipset. Its NUCLUN chip barely made it outside South Korea as it was allegedly overheating; subsequently, rumors about another LG-made chipset…

read more

ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking division,” although some experts who have reviewed the list say most of it was more likely created using simple Google searches of publicly available data. There are about 1,400 individuals included on the list. The list was accompanied by a message from the “Islamic State Hacking Division,” transcribed by Sky News: O Crusaders, as you continue your aggression towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move. We have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands. So wait, we too are waiting. The Sydney Morning Herald criticizes Australian officials for being “caught on their heels” by the hit list, which includes Defense Force employees and a Victorian MP. Even though “Australia’s most senior Islamic State militant, former Melbourne man and terror recruiter Neil Prakash” was posting links to the hit list early Wednesday morning, at least half of the Australians targeted by ISIS said they were unaware of the threat until they were informed by the media… which contacted them using the phone numbers published by the Islamic State. “I’m completely at a loss,” said the aforementioned MP, who at least has access to a security detail assigned to protect elected officials. “What do I do? The police probably know less than you and I.” Defense Force employees on the list said they were in shock no one from the government had warned them. Various agencies of the Australian government declined to discuss the matter. In addition to Prakash – who crowed “Cyber war got em shook!” and “Kill them where you find them and enslave their women” on Twitter – the Herald reports “other prominent militants, including British man Junaid Hussain, who is third on a CIA kill list of Islamic State operatives, also used social media to promote the leak and encourage attacks.” Sky News reports the hit list includes British Foreign Office employees, plus a “local council employee.” Most of the names on the list are American, including personnel from the Air Force, Marines, NASA, FBI, and the Port Authority of New York and New Jersey. Russian state outlet RT.com says the list also includes “a worker in an Israeli magistrate’s court” and “someone in a college in Mississippi.” The RT.com article mentions some reasons for skepticism about the Islamic State’s claim that this list includes confidential information obtained by hackers: some of the phone numbers appear to be disconnected, while the purportedly stolen U.S. military passwords appearing on the list are “too weak to pass the guidelines of an official computer system operated by the Pentagon.” The Sydney Morning Herald also found some of the information published on the list to be outdated. “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” said Army Chief of Staff General Ray Odierno, as quoted by the UK Guardian. The Guardian also cites the opinion of computer security expert Troy Hunt, who said the of the supposedly hacked data: “It’s pretty clear that it’s been aggregated from different sources. It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government. They’re not even strong enough to have come from an online service – you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.” The UK Daily Mail notes that Twitter administrators appear to have shut down the Islamic State Hacking Division’s account three times on Wednesday while it attempted to spread its hit list around, leading to the creation of a fourth terrorist account with the message, “Kuffar seem to be raging.”

August 17, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…

read more

Samsung releases the first Galaxy Note5 TV commercial: it’s all about the new design and new S Pen

August 15, 2015 Author: Category: Greg's Blog

Samsung today released the very first Galaxy Note5 TV commercial. Unlike this official Note5 promo video, which is too long to show up on TV, the commercial is a 30-second lively clip that showcases some of the new handset’s highlights, including its new metal-and-glass design, its multitasking capabilities, and the…

read more

The future of Xbox is bright, and it’s everywhere

August 13, 2015 Author: Category: Greg's Blog

Gamescom 2015 was a blast for Xbox fans. Just as E3 was before it. Microsoft keeps floating the phrase, “the best games line up in Xbox history,” and it’s probably true. After a flaky launch for the Xbox One by anyone’s standards, under Phil Spencer’s stewardship things are going in…

read more

It’s disturbingly easy to become a hacker millionaire

July 20, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans All it takes to make over $900,000 a year is to learn some code, pick up some Russian, decide to become a criminal, and have no fear. That’s it. Put it all together, take a deep breath, and then even you…

read more

It’s Your Business: My website was hacked. Here’s what I did.

July 1, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The feeling might best be compared to the emotions I felt when my home was invaded. First there was disbelief, then anger, and finally a lingering sense of vulnerability. According to a 2013 survey by the National Small Business Association (NSBA),…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved