Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

China Holds More Than 15,000 For Alleged Cyber Crime: Police

August 20, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans Chinese police have arrested more than 15,000 people to date for cyber crimes,  including hacking and fraud, while activists said the crackdown is also linked to the ruling Chinese Communist Party’s ongoing war on online public opinion. “More than 15,000 criminal…

read more

10 big, huge things that are somehow smaller than Apple’s market cap and cash chest

August 18, 2015 Author: Category: Greg's Blog

Apple’s riches is a favorite topic of tech media; a bottomless well of inspiration for works of hyperbole, awe, blind devotion, huge numbers, and arbitrary financial comparisons that make varying amounts of sense, but contain mandatory “wowza!” of epic proportions. If you are out of Apple’s infinite financial loop, let…

read more

Looking for affordable smartphones with Quad HD screens? Here are 8 of them that cost less than $500

August 17, 2015 Author: Category: Greg's Blog

Back in December 2013, when the world’s first Quad HD smartphone (Vivo Xplay 3S) was announced, everyone probably assumed that it, as well as the Quad HD handsets that were to follow, would be among the most expensive smartphones on the market. Fortunately, that’s not entirely true. Of course, many…

read more

Rumor: LG’s has a second Nuclun chip; it’s faster than the Exynos 7420 SoC, specs and benchmarks show

August 17, 2015 Author: Category: Greg's Blog

Aiming to get to the level of Samsung, Apple, and Huawei, LG has also been making its baby steps on the chipset scene, aiming to design its own smartphone chipset. Its NUCLUN chip barely made it outside South Korea as it was allegedly overheating; subsequently, rumors about another LG-made chipset…

read more

ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking division,” although some experts who have reviewed the list say most of it was more likely created using simple Google searches of publicly available data. There are about 1,400 individuals included on the list. The list was accompanied by a message from the “Islamic State Hacking Division,” transcribed by Sky News: O Crusaders, as you continue your aggression towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move. We have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands. So wait, we too are waiting. The Sydney Morning Herald criticizes Australian officials for being “caught on their heels” by the hit list, which includes Defense Force employees and a Victorian MP. Even though “Australia’s most senior Islamic State militant, former Melbourne man and terror recruiter Neil Prakash” was posting links to the hit list early Wednesday morning, at least half of the Australians targeted by ISIS said they were unaware of the threat until they were informed by the media… which contacted them using the phone numbers published by the Islamic State. “I’m completely at a loss,” said the aforementioned MP, who at least has access to a security detail assigned to protect elected officials. “What do I do? The police probably know less than you and I.” Defense Force employees on the list said they were in shock no one from the government had warned them. Various agencies of the Australian government declined to discuss the matter. In addition to Prakash – who crowed “Cyber war got em shook!” and “Kill them where you find them and enslave their women” on Twitter – the Herald reports “other prominent militants, including British man Junaid Hussain, who is third on a CIA kill list of Islamic State operatives, also used social media to promote the leak and encourage attacks.” Sky News reports the hit list includes British Foreign Office employees, plus a “local council employee.” Most of the names on the list are American, including personnel from the Air Force, Marines, NASA, FBI, and the Port Authority of New York and New Jersey. Russian state outlet RT.com says the list also includes “a worker in an Israeli magistrate’s court” and “someone in a college in Mississippi.” The RT.com article mentions some reasons for skepticism about the Islamic State’s claim that this list includes confidential information obtained by hackers: some of the phone numbers appear to be disconnected, while the purportedly stolen U.S. military passwords appearing on the list are “too weak to pass the guidelines of an official computer system operated by the Pentagon.” The Sydney Morning Herald also found some of the information published on the list to be outdated. “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” said Army Chief of Staff General Ray Odierno, as quoted by the UK Guardian. The Guardian also cites the opinion of computer security expert Troy Hunt, who said the of the supposedly hacked data: “It’s pretty clear that it’s been aggregated from different sources. It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government. They’re not even strong enough to have come from an online service – you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.” The UK Daily Mail notes that Twitter administrators appear to have shut down the Islamic State Hacking Division’s account three times on Wednesday while it attempted to spread its hit list around, leading to the creation of a fourth terrorist account with the message, “Kuffar seem to be raging.”

August 17, 2015 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans ISIS social media accounts are buzzing with a spreadsheet of personal data on employees of the American, British, and Australian governments, including military personnel. The Islamic State claims this list was compiled using data stolen from government systems by its “hacking…

read more

With Calendar for Android Wear, your schedule is never more than a tap away

August 14, 2015 Author: Category: Greg's Blog

Being in control of your schedule and keeping track of the many events that fill our lives can feel like a juggling act. Smartphones have made it easier, by giving us easy access to our calendars while we’re on the go. Calendar for Android Wear takes the ease of seeing…

read more

BlackBerry Porsche Design P’9983 Graphite comes to India priced at more than $1500 USD

August 14, 2015 Author: Category: Greg's Blog

Consumers in India are being asked to dig deep into their wallets if they want to purchase the BlackBerry Porsche Design P’9983 Graphite. The phone is priced in the country at the equivalent of $1535 USD. Some of the features you get for the money include a special back door…

read more

The Galaxy Note5 and S6 edge+ both flaunt better screen-to-body ratio than predecessor, especially the latter

August 13, 2015 Author: Category: Greg's Blog

With seemingly ever increasing screen sizes, smartphones are naturally becoming harder and harder to lug around or handle with anything less than two hands. And the problem is, we’re now talking a fundamental barrier here — our hands won’t grow 25% larger overnight, yet phone displays needed no longer than…

read more

Cyanogen: We have more users than Windows Mobile and BlackBerry combined

August 9, 2015 Author: Category: Greg's Blog

According to Cyanogen employee Adnan Begovic, who made the statement on Saturday at the Seattle Code Rush developer event, the company has 50 million users around the world and is employed by more mobile device owners than Windows Mobile and BlackBerry. Combined. Things are picking up quickly for the developer….

read more

Cyanogen: We have more users than Windows Mobile and BlackBerry combined

August 9, 2015 Author: Category: Greg's Blog

According to Cyanogen employee Adnan Begovic, who made the statement on Saturday at the Seattle Code Rush developer event, the company has 50 million users around the world and is employed by more mobile device owners than Windows Mobile and BlackBerry. Combined. Things are picking up quickly for the developer….

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved