Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

MS12-030 – Important : Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830) – Version: 1.0

May 8, 2012 Author: Category: Greg's Blog

Severity Rating: Important Revision Note: V1.0 (May 8, 2012): Bulletin published. Summary: This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could … View full post on National Cyber Security

read more

New Office malware attack hunts Snow Leopard, not Lion

May 2, 2012 Author: Category: Greg's Blog

While the Office-based vulnerability that is used to exploit OS X does not work in Lion, it serves as a reminder to always keep all software up-to-date. Originally posted at MacFixIt View full post on malware … View full post on National Cyber Security » Virus/Malware/Worms

read more

Malware uses Office flaw to target Mac OS X

May 2, 2012 Author: Category: Greg's Blog

Microsoft has warned of new malware that exploits an old flaw in Office to attack Mac OS X machines ( ZDNet UK – Security Threats ) View full post on malware – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms

read more

Microsoft detects malware targeting Mac OS X Office vulnerability

May 2, 2012 Author: Category: Greg's Blog

Microsoft has detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly three years ago. View full post on malware – Yahoo! News Search … View full post on National Cyber Security » Virus/Malware/Worms

read more

2600: @BlueSwirl Please email orders@2600.com with details. Our office manager returns from vacation this weekend and we’ll solve this.

April 30, 2012 Author: Category: Greg's Blog

2600: @BlueSwirl Please email orders@2600.com with details. Our office manager returns from vacation this weekend and we’ll solve this. View full post on Twitter / 2600 View full post on National Cyber Security

read more

Patch Tuesday April 2012 – Critical updates for Windows, Office and Adobe Reader

April 11, 2012 Author: Category: Greg's Blog

Microsoft released six patches for eleven vulnerabilities today for Windows, Office, SQL and other products. Adobe also updated their Reader app to fix four vulnerabilities that can be exploited by malicious PDF files. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Anonymous claims responsibility for Home Office cyber attack

April 10, 2012 Author: Category: Greg's Blog

The hacking group follows through on its threat to target the UK government. View full post on cyber attack – Yahoo! News Search Results View full post on National Cyber Security

read more

‘Protest’ hits Home Office website

April 7, 2012 Author: Category: Greg's Blog

The Home Office website has gone down after an apparent cyber attack in protest against Government surveillance plans. View full post on cyber attack – Yahoo! News Search Results View full post on National Cyber Security

read more

Report or challenge strangers in your office

March 27, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

ProtectMyID: #FBI Friday: An office manager is sentenced and fined after years of embezzling from her employer. http://t.co/KExsCNC3

March 10, 2012 Author: Category: Greg's Blog

ProtectMyID: #FBI Friday: An office manager is sentenced and fined after years of embezzling from her employer. http://t.co/KExsCNC3 View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved