Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Disabled Students Most Likely To Endure Bullying, Least Able To Report

January 28, 2017 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Earlier this month Here & Now reported on the beating of a white 18 year old with schizophrenia. Many pointed out that his attackers were black, and attributed the incident to racism. Read More…. The post Disabled Students Most Likely To…

read more

Teens Less Likely to Smoke Pot than 40-Year-Olds

September 6, 2016 Author: Category: Greg's Blog

The pot-smoking teen is a common stereotype, but a new government study has found that Americans ages 35 to 44 are now more likely to smoke marijuana than young people ages 12 to 17. While marijuana use has dramatically increased for older people, teen use has remained steady. If the…

read more

China likely hacked U.S. banking regulator: congressional report

July 13, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The Chinese government likely hacked computers at the Federal Deposit Insurance Corporation in 2010, 2011 and 2013, according a congressional report on Wednesday that cited an internal investigation by the banking regulator. “Even the former Chairwoman’s computer had been hacked by…

read more

Chhota Rajan most likely to be kept in Ajmal Kasab’s cell in Mumbai: Sources

November 2, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans When Chhota Rajan, who was arrested in Bali on Sunday, is brought to India by the CBI officials, he will most likely be kept in the same cell in the crime branch lock up in Mumbai police headquarters where 26/11 terrorist Ajmal…

read more

New Motorola phones will be announced on October 27 – shatterproof Droid Turbo 2 and Droid Maxx 2 likely included

October 14, 2015 Author: Category: Greg's Blog

Verizon and Motorola today revealed that they’re going to host a Droid-related event on October 27 in New York City. For now, the two companies aren’t providing too many details about the event, but they do say we’ll see new Droid devices then. Most probably, Verizon and Motorola will finally…

read more

LG V10 phone with secondary display likely to be unveiled at LG’s confirmed October 1st press event

September 14, 2015 Author: Category: Greg's Blog

Earlier today, LG started sending out invites to a press event on October 1 in New York City. Although the company did not reveal any details about the products that the event will focus on, there’s reason to believe that this event will bring the introduction of the rumored LG…

read more

HTC is likely to unveil the HTC A9 “Aero” on September 29 alongside another high-end handset

September 7, 2015 Author: Category: Greg's Blog

Last week, HTC teased an upcoming “handsome” smartphone, leading many to believe that the handset in question will be the often-rumored HTC One A9 “Aero”. Unfortunately for those of you with an eye for high-end smartphones, it turned out that HTC was referring to a mid-range model, the HTC Desire…

read more

Note5 model pops up in benchmarks with 3 GB of RAM only, likely headed for Europe

August 27, 2015 Author: Category: Greg's Blog

A little birdie apparently told Samsung’s focus groups that Europeans are not as much in a love affair with the S Pen stylus, as they are with unique side-sloping flexible displays. This could have been the reason behind Samsung’s decision to release the S Pen-laden Note5 in North America and…

read more

Motorola Moto 360 successor likely to come in two sizes

August 17, 2015 Author: Category: Greg's Blog

It looks like Motorola can’t keep the second-generation Moto 360 from leaking in various places online. Following a few spottings of a new Motorola smartwatch in the databases of regulatory organisms in past weeks, just a few days ago, Motorola may have allowed a sneak peak at the Moto 360…

read more

ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking division,” although some experts who have reviewed the list say most of it was more likely created using simple Google searches of publicly available data. There are about 1,400 individuals included on the list. The list was accompanied by a message from the “Islamic State Hacking Division,” transcribed by Sky News: O Crusaders, as you continue your aggression towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move. We have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands. So wait, we too are waiting. The Sydney Morning Herald criticizes Australian officials for being “caught on their heels” by the hit list, which includes Defense Force employees and a Victorian MP. Even though “Australia’s most senior Islamic State militant, former Melbourne man and terror recruiter Neil Prakash” was posting links to the hit list early Wednesday morning, at least half of the Australians targeted by ISIS said they were unaware of the threat until they were informed by the media… which contacted them using the phone numbers published by the Islamic State. “I’m completely at a loss,” said the aforementioned MP, who at least has access to a security detail assigned to protect elected officials. “What do I do? The police probably know less than you and I.” Defense Force employees on the list said they were in shock no one from the government had warned them. Various agencies of the Australian government declined to discuss the matter. In addition to Prakash – who crowed “Cyber war got em shook!” and “Kill them where you find them and enslave their women” on Twitter – the Herald reports “other prominent militants, including British man Junaid Hussain, who is third on a CIA kill list of Islamic State operatives, also used social media to promote the leak and encourage attacks.” Sky News reports the hit list includes British Foreign Office employees, plus a “local council employee.” Most of the names on the list are American, including personnel from the Air Force, Marines, NASA, FBI, and the Port Authority of New York and New Jersey. Russian state outlet RT.com says the list also includes “a worker in an Israeli magistrate’s court” and “someone in a college in Mississippi.” The RT.com article mentions some reasons for skepticism about the Islamic State’s claim that this list includes confidential information obtained by hackers: some of the phone numbers appear to be disconnected, while the purportedly stolen U.S. military passwords appearing on the list are “too weak to pass the guidelines of an official computer system operated by the Pentagon.” The Sydney Morning Herald also found some of the information published on the list to be outdated. “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” said Army Chief of Staff General Ray Odierno, as quoted by the UK Guardian. The Guardian also cites the opinion of computer security expert Troy Hunt, who said the of the supposedly hacked data: “It’s pretty clear that it’s been aggregated from different sources. It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government. They’re not even strong enough to have come from an online service – you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.” The UK Daily Mail notes that Twitter administrators appear to have shut down the Islamic State Hacking Division’s account three times on Wednesday while it attempted to spread its hit list around, leading to the creation of a fourth terrorist account with the message, “Kuffar seem to be raging.”

August 17, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved