Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Nudge theory – What data security can learn from politics

May 14, 2012 Author: Category: Greg's Blog

Seasoned IT professionals have long been aware that technology, challenging as it may be, is the easy part. Successful projects depend as much on people as computers. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

The Revolution from Cyber Terrorist attack to Indian Cyber Security

May 14, 2012 Author: Category: Greg's Blog

The Revolution from Cyber Terrorist attack to Indian Cyber Security Cyber attack has put our lives in danger every second. The cyber attacks are becoming the root cause of the mishappenings around us every other day. As the next generation wars are increasing depending on robust and secure information systems…

read more

Apple files face-recognition patent for iPhone and iPad security

May 14, 2012 Author: Category: Greg's Blog

Apple has filed a new patent application for face-recognition technology that could be used to improve security in iPhone and iPad devices. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

Adobe u-turn promises free security patches for Creative Suite

May 14, 2012 Author: Category: Greg's Blog

Adobe is to issue free security patches for Photoshop, Illustrator, and Flash Professional–the company’s high-profile Creative Suite applications. The U-turn reverses an attempt to force users to pay for a CS6 upgrade in order to rectify the problems. The security vulnerabilities affected both Mac and Windows platforms. View full post…

read more

Adobe Photoshop security vulnerabilities, updated since 09.05.2012

May 14, 2012 Author: Category: Greg's Blog

Memory corruptions on files processing. Applications: Photoshop CS5.5 (14.05.2012) View full post on Securityvulns news channel View full post on National Cyber Security

read more

SpywareLady: Internet Security Internet Privacy and You http://t.co/3puyNcjn

May 13, 2012 Author: Category: Greg's Blog

SpywareLady: Internet Security Internet Privacy and You http://t.co/3puyNcjn View full post on Twitter / SpywareLady View full post on National Cyber Security

read more

TheHackersNews: Advance Ethical #Hacking and Cyber #Security Boot Camp at Delhi, India http://t.co/rbN3tkZb

May 13, 2012 Author: Category: Greg's Blog

TheHackersNews: Advance Ethical #Hacking and Cyber #Security Boot Camp at Delhi, India http://t.co/rbN3tkZb View full post on Twitter / TheHackersNews View full post on National Cyber Security

read more

TheHackersNews: #Anonymous : We Are Not Terrorists but Fearless Freedom Fighters http://t.co/v13GImLI #Security #infosec

May 12, 2012 Author: Category: Greg's Blog

TheHackersNews: #Anonymous : We Are Not Terrorists but Fearless Freedom Fighters http://t.co/v13GImLI #Security #infosec View full post on Twitter / TheHackersNews View full post on National Cyber Security

read more

Chinese And US Security Chiefs Move To Defuse Cyber Cold War

May 11, 2012 Author: Category: Greg's Blog

View full post on News ≈ Packet Storm View full post on National Cyber Security

read more

Adobe’s security chief praises Apple for Flash-crippling move

May 10, 2012 Author: Category: Greg's Blog

Adobe’s head of security is applauding Apple’s move to block outdated versions of his company’s Flash Player. View full post on Computerworld Security News View full post on National Cyber Security » Announcements

read more

Posts navigation

Older posts
Newer posts
Copyright © 2026 . All Rights Reserved.
Screenr parallax theme by FameThemes