Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Premium Zopo phablet with ten processor cores, 4 GB RAM and a 2k display appears

August 31, 2015 Author: Category: Greg's Blog

One of the multiple up-and-coming Chinese phone makers, Zopo, might soon launch a true powerhouse of a flagship, complete with a record-busting deca-core chipset.  The prototype phablet from Zopo popped up with a 6″ Quad HD display, and what’s likely a Helio X20 chipset, as that’s the one carrying no…

read more

Likely Visa, MasterCard security breach linked to third-party processor

April 1, 2012 Author: Category: Greg's Blog

The credit card giants tell banks that a third-party payment processor may have been breached, causing the loss of tens of thousands of card numbers. View full post on SearchSecurity: Security Wire Daily News View full post on National Cyber Security

read more

Visa Investigates Possible Payment Processor Security Breach

December 16, 2011 Author: Category: Greg's Blog

Several European banks have already taken steps to limit potential fraud. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security

read more

Visa probes reported security breach of card processor

December 15, 2011 Author: Category: Greg's Blog

17,000 cards already blocked Credit card issuer Visa is investigating the possible breach of a payment processor in Europe that may have compromised more than 10,000 cards in Eastern Europe.… View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software

November 22, 2010 Author: Category: Greg's Blog

LIGATT: Back Orifice is: A. A worm B. A word processor C. Trojan horse software D. Scanning software View full post on Twitter / LIGATT

read more
Copyright © 2026 . All Rights Reserved.
Screenr parallax theme by FameThemes