Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Detect and prevent today’s sophisticated malware threats

March 21, 2012 Author: Category: Greg's Blog

(Credit: CNET) Today’s malware purveyor bears little resemblance to the outcast-teenage-loner caricature popular in days past. Last November the FBI’s Operation Ghost Click led to the arrest of six Estonians charged with promulgating the DNSChanger malware, which the FBI claims allowed the gang to steal $14 million by manipulating the…

read more

Apple malware became more sophisticated in 2011

January 26, 2012 Author: Category: Greg's Blog

Malware aimed at Macs is still insignificant compared to Windows but Apple users should to pay careful attention to the growing threat from social engineering attacks, a report has found. The Year in Mac Security by Apple security company Intego divides 2011 into two halves before and after the day,…

read more

2012 Will See a Rise in Cyber-espionage Attacks and Sophisticated Malware, Experts Say

December 26, 2011 Author: Category: Greg's Blog

The security industry expects the number of cyber-espionage attacks to increase in 2012 and the malware used for this purpose to become increasingly sophisticated. In the past two years there has been a surge in the number of malware-based attacks that resulted in sensitive data being stolen from government agencies,…

read more

Book Chronicles Fight to Save Web From Sophisticated Computer Worm

November 21, 2011 Author: Category: Greg's Blog

Listen to the Audio JUDY WOODRUFF: Finally tonight, the story of a potent computer worm. Margaret Warner has our book conversation. MARGARET WARNER: In November 2008, computer security experts began detecting a new, highly sophisticated computer worm. They called it Conficker. Ultimately, it invaded at least 12 million computers worldwide….

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved