Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Dorian Satoshi Nakamoto: I did not create, invent or otherwise work on Bitcoin

March 17, 2014 Author: Category: Greg's Blog

My name is Dorian Satoshi Nakamoto. I am the subject of the Newsweek story on Bitcoin. I am writing this statement to clear my name.I did not create, invent or otherwise work on Bitcoin. I unconditionally deny the Newsweek report.The first time I heard the term “bitcoin” was from my…

read more

Warning: Cellphones will become a way to attack otherwise protected devices

October 11, 2011 Author: Category: Greg's Blog

Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report. Compromised phones will infect computers they may plug into for otherwise legitimate reasons,…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved