Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Cell Phones : [ Samsung Galaxy Note 3 (T-Mobile), White ]

August 5, 2015 Author: Category: Greg's Blog

Enjoy apps, movies, books, and more View full post on Products

read more

Meizu m2 note launches in India on August 10th as an Amazon exclusive

August 5, 2015 Author: Category: Greg's Blog

The Meizu m2 note will be available in India starting on August 10th. In the country, the device will be sold exclusively by Amazon, priced at the equivalent of $157 USD. That is quite a busy price point in the region, currently inhabited by models like the Lenovo K3 Note,…

read more

Sprint rolling out Stagefright fix for the Galaxy Note 4 and Galaxy S6 series, Nexus 5 and Nexus 6

August 5, 2015 Author: Category: Greg's Blog

Early last week we told you that a team of mobile security researchers has uncovered a critical vulnerability in the source code of about 95% of all active Android smartphones. Called Stagefright, the vulnerability allows potential hackers to take control of your smartphone by sending out a malicious MMS that…

read more

Cell Phones : [ Samsung Galaxy Note 3 (Verizon), Black ]

August 5, 2015 Author: Category: Greg's Blog

Enjoy apps, movies, books, and more View full post on Products

read more

Cell Phones : [ Samsung Galaxy Note 3 (Verizon), White ]

August 5, 2015 Author: Category: Greg's Blog

Enjoy apps, movies, books, and more View full post on Products

read more

Take note and report use of fake IDs, DHS and DOJ tell law enforcement

October 31, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  access_control_identification Image Caption:  Fake badge Fake identification documents and badges that have turned up in non-terror related suspicious activity reports from around the U.S. show how fake documents and official accessories could be used by terrorists, according to a memo circulated by the Department of…

read more

Take note, report use, of fake IDs, DHS, DOJ tell law enforcement

October 31, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  access_control_identification Image Caption:  Fake badge Fake identification documents and badges that have turned up in non-terror related suspicious activity reports from around the U.S. show how fake documents and official accessories could be used by terrorists, according to a memo circulated by the Department of…

read more

Sophos Finds Traces Of New Mac Malware, Windows Users Should Also Take Note

April 28, 2012 Author: Category: Greg's Blog

Michael Harper for RedOrbit.com Mac users who haven’t already installed the recent system updates should take this story as a very stern reminder that they are still at high risk of contracting malware on their machines. English security firm Sophos has identified a new malware attack which not only targets…

read more

Zardari takes note of extortion complaints in Karachi

March 31, 2012 Author: Category: Greg's Blog

Islamabad, March 17 : President Asif Ali Zardari has taken note of the complaints of extortion and poor law and order situation in Karachi as the business community in the port city kept their establishment shut in protest Saturday. View full post on cyber extortion – Yahoo! News Search Results…

read more

The Global Note: Cleaning Homs…Japan, One Year Later…China’s “Dead Man Talking”

March 21, 2012 Author: Category: Greg's Blog

SYRIA: TOP U.N. OFFICIAL VISITS, AS REGIME MOPS UP AFTER THE CARNAGE -INSIDE HOMS…It’s a surreal scene: Syrian government troops and workers sweeping the streets of Homs, basically sweeping away signs of the bloody crackdown. Of course certain things cannot be swept away: from the air you can see a…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved