Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Browser Hacking Contests Leave $895,000 in Unclaimed Prize Money

March 13, 2012 Author: Category: Greg's Blog

Last-minute zero day exploits poked holes in Chrome and Firefox at CanSecWest, and a teenager won $60,000 — but the vast majority of Google’s prize money was left on table. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Lock it when you leave it

February 21, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

Debit Card Fraud can Leave you in the Lurch

February 9, 2012 Author: Category: Greg's Blog

If you think your funds are protected in the event of debit card fraud, you might be surprised to learn that in some circumstances, they really aren't. View full post on credit card fraud – Yahoo! News Search Results View full post on National Cyber Security

read more

ProtectMyID: Haven’t fully transferred to paperless billing? Don’t leave payments in your mailbox for pick up. Put them in a secure post office box.

February 1, 2012 Author: Category: Greg's Blog

ProtectMyID: Haven’t fully transferred to paperless billing? Don’t leave payments in your mailbox for pick up. Put them in a secure post office box. View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Lock your workstation before you leave your desk

December 27, 2011 Author: Category: Greg's Blog

December 11, 2011 Don’t enter your password on an untrusted computer. A password is only as secure as the computer or network it is used on. Bad Guys target public kiosk-type computers and wireless networks, such as those in Internet cafes, conference centers, hotels and motels, and airports. The instant…

read more

ProtectMyID: Office thieves can include coworkers, temporary employees, and nighttime staff—don’t leave personal items unattended at work. #identitytheft

December 21, 2011 Author: Category: Greg's Blog

ProtectMyID: Office thieves can include coworkers, temporary employees, and nighttime staff—don’t leave personal items unattended at work. #identitytheft View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

ProtectMyID: Are you shopping online at work? You could be making yourself vulnerable to #identitytheft. Always log out when you leave your desk.

December 19, 2011 Author: Category: Greg's Blog

ProtectMyID: Are you shopping online at work? You could be making yourself vulnerable to #identitytheft. Always log out when you leave your desk. View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

ProtectMyID: Don’t leave a trail for dumpster-diving identity thieves—shred bills, receipts, and financial statements. http://t.co/VQqTvtIp #besmart

December 2, 2011 Author: Category: Greg's Blog

ProtectMyID: Don’t leave a trail for dumpster-diving identity thieves—shred bills, receipts, and financial statements. http://t.co/VQqTvtIp #besmart View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

2 Calif. campus cops on leave for pepper spray

November 20, 2011 Author: Category: Greg's Blog

By PoliceOne Staff DAVIS, Calif. — Two campus police officers were placed on leave after using OC spray during a student protest, university officials said. After a video circulated Friday showing an officer spray a group, UC Davis Chancellor Linda P.B. Katehi was called to resign, according to the LA…

read more

If you access the Internet from a shared computer, make sure you don’t leave anything behind

September 26, 2011 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved