Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Premium Zopo phablet with ten processor cores, 4 GB RAM and a 2k display appears

August 31, 2015 Author: Category: Greg's Blog

One of the multiple up-and-coming Chinese phone makers, Zopo, might soon launch a true powerhouse of a flagship, complete with a record-busting deca-core chipset.  The prototype phablet from Zopo popped up with a 6″ Quad HD display, and what’s likely a Helio X20 chipset, as that’s the one carrying no…

read more

Likely Visa, MasterCard security breach linked to third-party processor

April 1, 2012 Author: Category: Greg's Blog

The credit card giants tell banks that a third-party payment processor may have been breached, causing the loss of tens of thousands of card numbers. View full post on SearchSecurity: Security Wire Daily News View full post on National Cyber Security

read more

Visa Investigates Possible Payment Processor Security Breach

December 16, 2011 Author: Category: Greg's Blog

Several European banks have already taken steps to limit potential fraud. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Visa probes reported security breach of card processor

December 15, 2011 Author: Category: Greg's Blog

17,000 cards already blocked Credit card issuer Visa is investigating the possible breach of a payment processor in Europe that may have compromised more than 10,000 cards in Eastern Europe.… View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software

November 22, 2010 Author: Category: Greg's Blog

LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software View full post on Twitter / LIGATT

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved