Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

The Art of Sanctions: Can North Korea Navigate Expanded Measures?

March 22, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Over the coming months, North Korean diplomats and businesspeople will work with their counterparts abroad to test and solve problems caused by the new constraints of UN Security Council Resolution (UNSCR) 2270[1] and a recently enacted US sanctions law. Moving money…

read more

Google’s new live wallpaper measures your battery life, notifications, and network signal strength

October 11, 2015 Author: Category: Greg's Blog

Google Creative Labs has released a new live wallpaper that actually serves a purpose. Most Android users have avoided using live wallpaper because of the way they chew up battery life. While they looked cool when Android was first getting off the ground, most live wallpaper now seems dated and…

read more

Take these 6 security measures to protect your IoT devices from hackers

July 4, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans BI Intelligence estimates that by 2020 there will be more than 23 billion IoT devices connected to the internet. One of the biggest challenges in connecting so many devices will be in securing them to prevent hackers from controlling them or…

read more

Snapchat’s Security Measures In Visual Form via @scopey123

January 7, 2014 Author: Category: Greg's Blog

Snapchat’s Security Measures In Visual Form via @scopey123 View full post on Your Anon News Read More…. View full post on The Cyber Wars

read more

In three bipartisan votes, Houses passes three security-related measures

December 4, 2013 Author: Category: Greg's Blog

Top Priority Sector:  federal_agencies_legislative Image Caption:  Rep. Michael McCaul Read More…. View full post on The Cyber Wars

read more

Apple enhances App Store security with new measures

April 20, 2012 Author: Category: Greg's Blog

Apple appears to have enhanced its iTunes account security by asking users a series of security questions on their iOS devices. Users are confronted with a “Security Info Required” prompt and asked to provide answers to their choice of three security questions. Users are also asked to provide a second…

read more

Problems at Oak Hill Cemetery could prompt new security measures

March 27, 2012 Author: Category: Greg's Blog

HAMMOND | Reports of late-night visitors at Oak Hill Cemetery may lead to new security requirements. View full post on could security – Yahoo! News Search Results View full post on National Cyber Security

read more

US ISPs Agree to FCC-Recommended Security Measures (March 22, 2012)

March 24, 2012 Author: Category: Greg's Blog

Eight US Internet service providers (ISPs) in the US, including the four largest in the country, have committed to implementing cyber security measures recommended by the US Federal Communications Commission (FCC) advisory board……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Lawmakers seek answers from Google on new privacy measures

January 27, 2012 Author: Category: Greg's Blog

Google’s decision this week to share user data across its online services has caught the attention of eight members of the US House of Representatives, with the lawmakers asking whether the changes will compromise privacy. The eight lawmakers, three Republican and five Democrats, said the move raises questions about consumer…

read more

Microsoft SharePoint users ignore security measures, says survey

January 21, 2012 Author: Category: Greg's Blog

Copying documents out of Microsoft SharePoint to less secure media such as email and thumb drives is common among users of the collaboration platform, at least in the UK. According to a survey of 100 users who attended a SharePoint conference in November, 45% have made such copies, with 18%…

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved