Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Windows 8 picture security just a toy, claims RSA SecurID inventor

December 23, 2011 Author: Category: Greg's Blog

The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it’s not very good security, according to the inventor of RSA’s SecurID token. “I think it’s cute,” says Kenneth Weiss, who now runs a three-factor authentication…

read more

Windows 8 picture security just a toy, claims RSA SecurID inventor

December 23, 2011 Author: Category: Greg's Blog

The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it’s not very good security, according to the inventor of RSA’s SecurID token. “I think it’s cute,” says Kenneth Weiss, who now runs a three-factor authentication…

read more

Picture password protects your account from phishing

November 4, 2011 Author: Category: Greg's Blog

A new graphical password is easy to use on legitimate sites, but hard to remember when you’re faced with a phishing attack View full post on phishing – Yahoo! News Search Results View full post on National Cyber Security

read more

Scarlett Johansson Nude Picture Hacker Pleads Not Guilty

November 2, 2011 Author: Category: Greg's Blog

John Shearer/Getty Images; Toff Oren/FilmMagic The man accused of playing peekaboo with the private email accounts of Scarlett Johansson, Mila Kunis, Christina Aguilera and dozens of others is not owning up to any alleged cybercrimes just yet. After apologizing to victims and telling the press two weeks ago that he…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved