Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

TSA to convert a Coachmen RV into a mobile command post in Tennessee

October 23, 2013 Author: Category: Greg's Blog

Jacob Goodwin Top Priority Sector:  disaster_preparedness_emergency_response Image Caption: Read More…. View full post on The Cyber Wars

read more

UFC 156 Dana White Post Fight Media Scrum

October 12, 2013 Author: Category: Greg's Blog

https://twitter.com/ZProphet_MMA. Read More…. View full post on Hip Hop Security

read more

Huffington Post will soon ban anonymous comments

September 15, 2013 Author: Category: Greg's Blog

Arianna Huffington wants her website to be a “troll-free zone” and plans to start banning anonymous posts next month. ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

BRAWL INC. post fight interview with TJ “Tombstone” Jones

September 2, 2013 Author: Category: Greg's Blog

MMATopics.net caught up with the 1st ever BRAWL INC. Heavyweight Champ TJ ‘Tombstone’ Jones (9-1) after his fight with Shawn Bales at BRAWL INC. Bike Rally B… Read More…. View full post on Hip Hop Security

read more

Command Post: “Is a Cyber Pearl Harbor on the Horizon?”

July 26, 2012 Author: Category: Greg's Blog

The first of five episodes of a discussion about the threat of cyber war, with TIME and the Center for a New American Security View full post on The Cyber Wars

read more

NYTimes.com XSS Vulnerability Allows Attacker to Post Fake Story

July 24, 2012 Author: Category: Greg's Blog

Sir Cumv3nt Virtual Threat (Contributing Writer) In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not […] ↓ Read the rest of this entry… View full…

read more

Command Post: “Cyber War: Fact or Fiction?”

July 15, 2012 Author: Category: Greg's Blog

Where are cyber-defense dollars best spent? A discussion between TIME and the Center for a New American Security View full post on The Cyber Wars

read more

[remote] – Oracle Weblogic Apache Connector POST Request Buffer Overflow

May 19, 2012 Author: Category: Greg's Blog

Oracle Weblogic Apache Connector POST Request Buffer Overflow View full post on Exploit-DB updates View full post on National Cyber Security

read more

Limit the amount of personal information you post about yourself, your friends, and your family

February 6, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

ProtectMyID: Haven’t fully transferred to paperless billing? Don’t leave payments in your mailbox for pick up. Put them in a secure post office box.

February 1, 2012 Author: Category: Greg's Blog

ProtectMyID: Haven’t fully transferred to paperless billing? Don’t leave payments in your mailbox for pick up. Put them in a secure post office box. View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved