Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

When Hackers Hack Each Other—A Staged Affair in the French Underground?

August 23, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans This past July, we published a blog post on a new illegal gambling system known as “French Dark Bets (FDB).” FDB is run and hosted by one of the biggest French underground marketplace, the French Dark Net (FDN). This betting The…

read more

Syrian War: Is The Chemical Attack A False Flag & Staged? – To day (24h August 2013)

August 31, 2013 Author: Category: Greg's Blog

Syrian War: Is The Chemical Attack A False Flag & Staged? Alex covers the move toward war against Syria following a questionable chemical attack on this Thur… Read More…. View full post on The Cyber Wars

read more

Art professor impersonated tea party activist, staged Facebook hacking, calls it ‘performance art’

March 27, 2012 Author: Category: Greg's Blog

A Utah college professor helped create and cultivate a fake identity as a tea party activist for nearly two years, using a fictional Facebook account to deceive thousands of conservatives as part of an elaborate “performance art” project, The Daily Caller has learned. View full post on facebook hacker – Yahoo! News Search…

read more

Multifunctional malware, staged drive-by attacks to rise in 2012

December 30, 2011 Author: Category: Greg's Blog

Automated toolkits with business models that include rental agreements and constant updates will gain considerable improvements in 2012, with many attack kits being primed with new features that enable even the least tech-savvy cybercriminals to hone malware in 2012 for highly targeted attacks. It all starts with a blob of…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved