Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Lenovo’s ZUK Z1 will be launched internationally running Cyanogen OS 12.1

August 19, 2015 Author: Category: Greg's Blog

ZUK is a brand new Lenovo-backed company which, according to its own description, wants to take “aim at both mobile Internet, and Internet of Things (IoT).” Until now, ZUK announced only one product: the ZUK Z1 smartphone. Currently available only in China, the Z1 will also be released internationally, and…

read more

BlackBerry’s new Passport Silver Edition spotted running Android

August 8, 2015 Author: Category: Greg's Blog

The idea of BlackBerry dropping a smartphone that runs Android is one that piques the interest of many, and in the run-up to the all new BlackBerry Passport Silver Edition, it was believed that the Canadian firm might finally take the bait. It wasn’t to be on this occasion, with…

read more

Police just arrested 4 men suspected of running scams tied to one of the biggest data breaches in history

July 23, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans US and Israeli law enforcement officials have arrested four men for suspected involvement in cyber blackmail and stock manipulation scams believed to be tied to the 2014 JPMorgan data breach. The US Federal Bureau of Investigation (FBI) reported the arrests of…

read more

New backdoor worm found attacking websites running Apache Tomcat

November 24, 2013 Author: Category: Greg's Blog

  Researchers have identified new self-replicating malware that infects computers running the Apache Tomcat Web server with a backdoor that can be used to attack other machines. Java.Tomdep, as the backdoor worm has been dubbed, is Java Servlet-based code that gives Apache Tomcat platforms malicious capabilities. It causes infected machines to maintain Internet…

read more

New information about officer whose wife is suspected of running prostitution ring

August 10, 2013 Author: Category: Greg's Blog

He has faced disciplinary action in the past. Read More…. View full post on Select From Our Menu

read more

Elite Chinese hacker rumored to be running Anvisoft antivirus firm

November 30, 2012 Author: Category: Greg's Blog

Elite Chinese hacker rumored to be running Anvisoft antivirus firm By: Ryan Whitwam Whenever a new antivirus firm pops up, the Internet tends to be wary. Recent years have seen a multitude of malicious hacks and trojans masquerading as legitimate antivirus software, and suspicion is even more warranted when a…

read more

#Ebook Deal/Day: Node: Up and Running – $13.99 (Save 50%) Use code DEAL

October 13, 2012 Author: Category: Greg's Blog

Get “Node: Up and Running” today using code DEAL and save 50%! This sale ends at 2:00 AM 2012-10-15 (PDT, GMT-8:00). View full post on O’Reilly News and Commentary For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on –

read more

SpywareLady: iOS Hacker Pod2g Gets iOS 5.1 Untethered Jailbreak Running On His … http://t.co/qeqfDAlb

May 7, 2012 Author: Category: Greg's Blog

SpywareLady: iOS Hacker Pod2g Gets iOS 5.1 Untethered Jailbreak Running On His … http://t.co/qeqfDAlb View full post on Twitter / SpywareLady View full post on National Cyber Security

read more

SpywareLady: iOS Hacker Pod2g Gets iOS 5.1 Untethered Jailbreak Running On His iPhone 4 http://t.co/Fmh4sDxc

May 3, 2012 Author: Category: Greg's Blog

SpywareLady: iOS Hacker Pod2g Gets iOS 5.1 Untethered Jailbreak Running On His iPhone 4 http://t.co/Fmh4sDxc View full post on Twitter / SpywareLady View full post on National Cyber Security

read more

US Army Running Short on Qualified IT Security Staff; Lowering Standards (April 10, 2012)

April 15, 2012 Author: Category: Greg's Blog

The US Army is finding itself without enough qualified IT staff to fill available positions……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved