Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Google Chrome update fixes 12 vulnerabilities and patches Flash Player

February 18, 2012 Author: Category: Greg's Blog

Google released a new version of its Chrome browser in order to update the bundled Flash Player plug-in and address serious security vulnerabilities. Google Chrome 17.0.963.56 fixes 12 security flaws, seven of which are considered high severity, four of medium severity and one of low severity. Security researcher Jüri Aedla…

read more

Adobe Patches Flash Player Security Flaws

February 17, 2012 Author: Category: Greg's Blog

The emergency update patches seven vulnerabilities. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Oracle Java and Adobe Shockwave patches for February too

February 15, 2012 Author: Category: Greg's Blog

Adobe and Oracle both released critical fixes as their valentine to you. Shockwave and Java both contain remote code execution vulnerabilities, so be sure to update them as soon as possible. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Mozilla patches ‘critical’ Firefox security hole

February 12, 2012 Author: Category: Greg's Blog

Mozilla rates this a "critical" vulnerability that can be used to run attacker code and install software, requiring no user interaction beyond normal browsing. View full post on firefox hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

DO NOT install Microsoft patches or updates sent by email (They are fake)

February 6, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

HTC Patches Wi-Fi Security Flaw in Android Phones

February 2, 2012 Author: Category: Greg's Blog

The vulnerability could allow an attacker to view all Wi-Fi user names, passwords and SSID information stored on a device. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Google patches 4 serious Chrome bugs, ups bounty payments

January 25, 2012 Author: Category: Greg's Blog

Google has patched four vulnerabilities in Chrome, and disclosed that it had patched a fifth two weeks ago. The refresh of Chrome 16 was the second security-related update for the browser this month. One of the five bugs Google said had been quashed was actually a leftover from the 9…

read more

Microsoft patches dangerous web flaw in double time

December 31, 2011 Author: Category: Greg's Blog

Microsoft has issued an out-of-band fix for a vulnerability in its ASP.NET web platform that could allow an attacker to launch a successful DoS attack on a server using a nothing more sophisticated than a stream of 100kb files. Although not yet being exploited in the wild, Microsoft decided the…

read more

Adobe patches two vulnerabilities in Reader and Acrobat

December 16, 2011 Author: Category: Greg's Blog

Adobe releases out-of-band patch for Adobe Reader and Acrobat 9.x in order to address actively exploited vulnerabilities Adobe Systems has released Adobe Reader and Acrobat 9.4.7 in order to patch two vulnerabilities that are being actively exploited in attacks against companies from the defense industry. One of the security flaws,…

read more

Google’s Chrome 16 Patches 15 Security Flaws

December 14, 2011 Author: Category: Greg's Blog

The newest version of the browser addresses six high-risk, seven medium-risk, and two low-risk vulnerabilities. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved