Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Microsoft: Macs ‘not safe from malware, attacks will increase’

May 4, 2012 Author: Category: Greg's Blog

Microsoft has discovered a new piece of Mac malware that exploits a three-year-old flaw in old versions of Office for Mac. The company recommends Mac users to keep installed software updated. View full post on malware … View full post on National Cyber Security

read more

Iran: Oil industry safe after hacker attack, computer virus target computer systems

April 24, 2012 Author: Category: Greg's Blog

Industry's computer systems working well despite attack from hackers, computer virus, government minister says View full post on hacker – Yahoo! News Search Results View full post on National Cyber Security » Computer Hacking

read more

ProtectMyID: Think your #identity is safe in #storage? Think again. http://t.co/dZkM2xYA #identitytheft #besmart #privacy

April 23, 2012 Author: Category: Greg's Blog

ProtectMyID: Think your #identity is safe in #storage? Think again. http://t.co/dZkM2xYA #identitytheft #besmart #privacy View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

ProtectMyID: Ensure that #springbreak is as safe and relaxing as possible. Protect yourself while on #vacation. http://t.co/QJEAGbYK

April 2, 2012 Author: Category: Greg's Blog

ProtectMyID: Ensure that #springbreak is as safe and relaxing as possible. Protect yourself while on #vacation. http://t.co/QJEAGbYK View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Better safe than sorry: If you’re unsure that a file or program is clean, scan it for malware before you open or install it

March 23, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

Online Banking: Is Your Money Safe From Hackers?

March 21, 2012 Author: Category: Greg's Blog

Banks are beefing up security for consumers who bank online. Protect yourself with these tips. View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

ProtectMyID: What belongs in your safe? Consider this: your #SSN and other personally identifying info is far more valuable than jewels. #privacy #besafe

March 10, 2012 Author: Category: Greg's Blog

ProtectMyID: What belongs in your safe? Consider this: your #SSN and other personally identifying info is far more valuable than jewels. #privacy #besafe View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Three Low-Cost Ways to Keep Data Safe When Traveling for Business

March 6, 2012 Author: Category: Greg's Blog

Technology can make business trips easier, but it can also create new risks you need to address. View full post on firefox hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

How LulzSec kept itself safe during the summer of ‘lulz’

February 29, 2012 Author: Category: Greg's Blog

The infamous hackers sought protection from online security service CloudFlare. The company's boss, Matthew Prince , reveals why View full post on lulzsec hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Online security: How to stay safe while surfing the Internet

February 27, 2012 Author: Category: Greg's Blog

With every click you make when surfing the Web your online security is potentially at risk from fraudulent sites, dangerous downloads and sinister spyware. All of which will compromise your Internet security in the blink of an eye. Luckily for you here’s a handy and easy-to-use guide on how to…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved