Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Bogus Facebook accounts easy to spot, new study finds

February 3, 2012 Author: Category: Greg's Blog

Bogus Facebook profiles used to spread malware are overwhelmingly created to appear female, have an unusually high number of ‘friends’ and often claim to be bisexual, a study of the phenomenon has found. Barracuda Networks’ random sampling of 2,884 active Facebook accounts using its Profile Protector tool set out to…

read more

How to spot a phishing email…

December 13, 2011 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

ProtectMyID: #Truesday: It is unsafe to make online purchases at a coffee shop or a public hot spot. T or F?

November 22, 2011 Author: Category: Greg's Blog

ProtectMyID: #Truesday: It is unsafe to make online purchases at a coffee shop or a public hot spot. T or F? View full post on Twitter / ProtectMyID View full post on National Cyber Security Gergory Evans

read more

Researchers spot malware using a stolen government certificate

November 15, 2011 Author: Category: Greg's Blog

Researchers from F-Secure have spotted a digitally signed malware using a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute. From F-Secure’s post: Every now and then we run into malware that has been signed with a code signing certificate. This is problematic, as an unsigned Windows…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved