Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

FDA alert advises hospitals and med centers stop using hacker-vulnerable networked IV pumps

August 5, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans The U.S. Food and Drug Administration has issued an alert advising hospitals, nursing homes, and other medical care centers to stop using the Symbiq Infusion System of intravenous pumps, which deliver IV medications with dosages programmed over a hospital’s wireless network. As…

read more

Do auto manufacturers realise dangers of networked motors?

July 24, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans While computers bring great benefits they come with drawbacks too – not least, as news stories reveal every day, the insecurity of often very private data connected to the public internet. Only now that computers are appearing in practically everything, the…

read more

May 4 – 6, 2015-12th — USENIX Symposium on Networked Systems Design and Implementation

January 24, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Join us in Oakland, CA, for the 12th — USENIX Symposium on Networked Systems Design and Implementation. NSDI ’15 provides a high-quality, single-track forum for presenting results and discussing ideas that further the knowledge and understanding of the networked systems community…

read more

Fully Networked Car 2012 sets priorities for new ITS standards agenda

March 9, 2012 Author: Category: Greg's Blog

Vehicle connectivity and Intelligent Transport Systems (ITS) applications are the key priorities where standards development is needed to meet industry needs. View full post on ISO – Latest News View full post on National Cyber Security

read more

Computer Hacking Proliferating with Highly Networked Society

August 18, 2011 Author: Category: Greg's Blog

Google, the International Monetary Fund and Sony represent major names in the world economy. But the three share another distinction — recently disclosed attacks by computer hackers that have compromised sensitive information. View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security…

read more

Computer hacking proliferating with highly networked society, expert says

August 18, 2011 Author: Category: Greg's Blog

Google, the International Monetary Fund and Sony represent major names in the world economy. But the three share another distinction — recently disclosed attacks by computer hackers that have compromised sensitive information. View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved