Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Malware Automates Storing of Data Haul on File-hosting Site SendSpace

February 6, 2012 Author: Category: Greg's Blog

Trend Micro researchers have discovered a piece of malicious software that automatically uploads its stolen data cache to the SendSpace file-sharing service for retrieval. Malware authors have used file-hosting and sharing servers for that purpose before, but this is the first time malware has been noticed to do that automatically,…

read more

ProtectMyID: If you’re storing personal information on electronic devices, make sure to password protect access to the devices. #cybersecurity

November 24, 2011 Author: Category: Greg's Blog

ProtectMyID: If you’re storing personal information on electronic devices, make sure to password protect access to the devices. #cybersecurity View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved