Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Middle East shifting from analog to IP-based video surveillance, says IMS Research

July 25, 2012 Author: Category: Greg's Blog

Top Priority Sector:  video_surveillance_cctv Image Caption:  Monitoring videoin Saudi Arabia IMS Research estimates that the tipping point when network video surveillance sales overtake analog video surveillance sales has already occurred in the Middle East. The company’s recently published report on […] ↓ Read the rest of this entry… View full…

read more

Cyber war is on says Umno youth deputy head

July 25, 2012 Author: Category: Greg's Blog

Umno and BN partners will enter cyberspace in war against the opposition says Khairy Jamaluddin View full post on The Cyber Wars

read more

ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)

May 23, 2012 Author: Category: Greg's Blog

A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security

read more

ZTE Says it Will Fix Backdoor in ScoreM Handsets (May 18, 2012)

May 23, 2012 Author: Category: Greg's Blog

A China-based handset manufacturer has acknowledged that one of its models contains a backdoor……. View full post on SANS NewsBites View full post on National Cyber Security

read more

ITC Panel Says Motorola Phones Infringe Microsoft Patent

May 20, 2012 Author: Category: Greg's Blog

Some of Motorola Mobility’s Android phones infringe on a Microsoft patent, a U.S. trade panel said in ordering that the devices be barred from importation into the United States. Read the article: Reuters View full post on … View full post on National Cyber Security

read more

Twitter says leaked passwords mostly inaccurate or for suspended spammers

May 9, 2012 Author: Category: Greg's Blog

Twitter logins and passwords leaked on the web this week are mostly inaccurate or belong to accounts already suspended for spamming, the company said last night. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

Twitter says leaked passwords inaccurate, accounts already suspended

May 9, 2012 Author: Category: Greg's Blog

Many of the Twitter logins and passwords leaked on the web this week are either inaccurate or belong to accounts already suspended for spamming, the company said late Tuesday. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

McAfee Founder Booked On Drug, Weapons Charges, Report Says

May 6, 2012 Author: Category: Greg's Blog

View full post on News ≈ Packet Storm View full post on National Cyber Security

read more

Android malware used to mask online fraud, says expert

May 4, 2012 Author: Category: Greg's Blog

Android malware being automatically distributed from hacked websites looks like it’s being used to mask online purchases, and could be part of a fraud gang’s new push into mobile, researchers said today. View full post on Computerworld Security News View full post on National Cyber Security » Announcements

read more

NASA says no sensitive information breached in Unknowns hack

May 4, 2012 Author: Category: Greg's Blog

NASA acknowledged an attack on one of its websites by “The Unknowns,” a group that has been publicly trickling information on websites it has hacked over the last few weeks. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved