Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Report: T-Mobile is a takeover target again

September 17, 2015 Author: Category: Greg's Blog

Earlier this year, T-Mobile and Dish Network were said to be closing in on a merger between the two companies before things stalled in July. Since then, it seems that the two have gone their separate ways with nary a peep about a takeover mentioned in the last few months….

read more

FBI questions in-flight hacker who claims plane takeover

May 27, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans A hacker told the FBI last week he has been able to crack aircraft computers on numerous occasions—as a passenger. According to the affidavit, Chris Roberts claims he caused a plane to move laterally and climb while he was connected to…

read more

Microsoft admits technical error in IP takeover, but No-IP still down

July 2, 2014 Author: Category: Greg's Blog

Microsoft admitted Tuesday it made a technical error after it commandeered part of an Internet service's network in order to shut down a botnet, but the Nevada-based company says its services are still down. View full post on Computerworld Cybercrime and Hacking News ________________ Other Sites You May Like: Read…

read more

OWS Takeover of the Brooklyn Bridge – October 1, 2011

February 24, 2013 Author: Category: Greg's Blog

What an amazing day. Thousands cross the Brooklyn bridge in the car lane, and some on the pedestrian crossing. 700 revolutionaries arrested.

read more

Anonymous takeover of The Great Dictator

January 1, 2013 Author: Category: Greg's Blog

One of the best speeches of all time; effectively impactful in today’s times.

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved