Skip to content

Gregory D. Evans

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Tag: phone

Baldify – Go Bald is today’s Windows Phone myAppFree Deal

August 18, 2015 Author: Category: Greg's Blog

If you have ever been curious how you would look bald, the Windows Phone app Baldify – Go Bald is here to help satisfy that itch. The app is from the same developers who created Oldify and Beardify. Instead of aging your photo or adding facial hair, Baldify removes a…

read more

Letter: Be cautious with phone solicitation

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans After having been hacked on our computer, I reported the crime to the Clark County Sheriff’s Office. A deputy came out to talk with us. We showed him the phone number of the hacker, but there was nothing the police could…

read more

Don’t Be Scared Of That 60 Minutes Report On Phone Hacking

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans If you own a mobile phone, “you can be bugged, tracked and hacked from anywhere in the world”. That was the throughline of a particularly problematic story on the 60 Minutes program last night. It’s now being hailed as “the end of…

read more

Cell Phone Unlocking Service: Unlock All Phones for $20 only – $20 (Toronto)

August 18, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Unlock your phone with Canada’s factory unlock source! 20DollarUnlocks.ca has you covered with all phone unlocks for $20, regardless of phone make/model* Simple policy: No unlock, No charge. If we are unable to provide you an unlock, you get your refund…

read more

Dynamite Fishing World Games, a Windows Phone game for the Redneck in all of us

August 17, 2015 Author: Category: Greg's Blog

Dynamite Fishing World Games is not your typical fishing game. You leave your rod and reel at the house and will not need to worry about fishing lures and bait Instead, your tackle box is filled with dynamite, nuclear devices and other explosives. You navigate your boat across various fishing…

read more

ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking division,” although some experts who have reviewed the list say most of it was more likely created using simple Google searches of publicly available data. There are about 1,400 individuals included on the list. The list was accompanied by a message from the “Islamic State Hacking Division,” transcribed by Sky News: O Crusaders, as you continue your aggression towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move. We have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands. So wait, we too are waiting. The Sydney Morning Herald criticizes Australian officials for being “caught on their heels” by the hit list, which includes Defense Force employees and a Victorian MP. Even though “Australia’s most senior Islamic State militant, former Melbourne man and terror recruiter Neil Prakash” was posting links to the hit list early Wednesday morning, at least half of the Australians targeted by ISIS said they were unaware of the threat until they were informed by the media… which contacted them using the phone numbers published by the Islamic State. “I’m completely at a loss,” said the aforementioned MP, who at least has access to a security detail assigned to protect elected officials. “What do I do? The police probably know less than you and I.” Defense Force employees on the list said they were in shock no one from the government had warned them. Various agencies of the Australian government declined to discuss the matter. In addition to Prakash – who crowed “Cyber war got em shook!” and “Kill them where you find them and enslave their women” on Twitter – the Herald reports “other prominent militants, including British man Junaid Hussain, who is third on a CIA kill list of Islamic State operatives, also used social media to promote the leak and encourage attacks.” Sky News reports the hit list includes British Foreign Office employees, plus a “local council employee.” Most of the names on the list are American, including personnel from the Air Force, Marines, NASA, FBI, and the Port Authority of New York and New Jersey. Russian state outlet RT.com says the list also includes “a worker in an Israeli magistrate’s court” and “someone in a college in Mississippi.” The RT.com article mentions some reasons for skepticism about the Islamic State’s claim that this list includes confidential information obtained by hackers: some of the phone numbers appear to be disconnected, while the purportedly stolen U.S. military passwords appearing on the list are “too weak to pass the guidelines of an official computer system operated by the Pentagon.” The Sydney Morning Herald also found some of the information published on the list to be outdated. “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” said Army Chief of Staff General Ray Odierno, as quoted by the UK Guardian. The Guardian also cites the opinion of computer security expert Troy Hunt, who said the of the supposedly hacked data: “It’s pretty clear that it’s been aggregated from different sources. It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government. They’re not even strong enough to have come from an online service – you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.” The UK Daily Mail notes that Twitter administrators appear to have shut down the Islamic State Hacking Division’s account three times on Wednesday while it attempted to spread its hit list around, leading to the creation of a fourth terrorist account with the message, “Kuffar seem to be raging.”

August 17, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…

read more

Windows Phone Weekly Digest: August 16, 2015

August 16, 2015 Author: Category: Greg's Blog

There’s a lot going on in the world of Windows Phone. So much, in fact, that it is sometimes tough to catch every important story. Device rumors come and go. New apps join the Windows Phone Store, and your favorite app can get a big update with a new look…

read more

How to download Windows Phone apps using this Chrome browser QR code generator

August 13, 2015 Author: Category: Greg's Blog

Earlier this year, I wrote a tip for those using Google Chrome as their primary web browser. Although Microsoft’s Edge is getting extension support later this year, including the porting of Chrome extensions, Chrome has them right now. The extension that I am talking about simply auto-generates a localized QR…

read more

Galaxy Note5 specs review: Samsung’s best phone to the mark

August 13, 2015 Author: Category: Greg's Blog

Just as it did with its flagship Galaxy S line this year, Samsung now infuses a small revolution into the Note portfolio, the franchise that arguably started the whole phablet craze a couple of years back.  Not only did we get a breathtaking redesign with the Galaxy Note5, but the…

read more

Facebook Loophole Makes Your Phone Number A Data Hacking Tool

August 13, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Facebook has been asked to fix its security settings after a product specialist had the capacity harvest information about a great many clients – just by speculating their versatile numbers. The designer acquired the names, profile pictures and areas of clients…

read more

Posts navigation

Older posts
Newer posts
Copyright © 2025 Gregory D. Evans. All Rights Reserved.
Screenr parallax theme by FameThemes