Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

The Hacker: Dark and stormy nights made up for all that fresh air in the daytime

December 10, 2011 Author: Category: Greg's Blog

They are not always straightforward, either. Jarlath, one of our Irish members, found this in the winter league last Sunday when his ball ended up at the foot of a tree. Sadly, his valiant attempt to hit it suffered a double calamity. His swing missed the ball but didn’t miss…

read more

Dowler: Hacking Made Us Think Daughter Was Alive

November 21, 2011 Author: Category: Greg's Blog

The parents of murdered teen Milly Dowler say that phone hacking on behalf of a British tabloid made them think that she was still alive. View full post on National Cyber Security Gergory Evans

read more

Arrests made in malware which infected millions of computers worldwide

November 9, 2011 Author: Category: Greg's Blog

By dts Nachrichtenagentur and Europe Online         Six people were arrested in Estonia on Tuesday as part of a major investigation into international internet fraud which left more than four million computers infected with malware, U.S. prosecutors announced on Wednesday. The indictment in the U.S. District Court for the…

read more

HTCS1: “Things do not happen. Things are made to happen.” -John F. Kennedy

September 28, 2011 Author: Category: Greg's Blog

HTCS1: “Things do not happen. Things are made to happen.” -John F. Kennedy View full post on Twitter / HTCS1

read more

LIGATT: “Things do not happen. Things are made to happen.” -John F. Kennedy

July 6, 2011 Author: Category: Greg's Blog

LIGATT: “Things do not happen. Things are made to happen.” -John F. Kennedy View full post on Twitter / LIGATT

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved