­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Wireline faces tepid revenue growth through 2016, analysts say

May 20, 2012 Author: Category: Greg's Blog

Business spending on wireline services will remain essentially flat for years to come, as wireless revenues make modest gains, a newly released telecom market forecast indicates. The U.S. wireline market “will increase slowly,” from revenue of … View full post on National Cyber Security

read more

Android malware now spreading through hacked Web sites

May 3, 2012 Author: Category: Greg's Blog

Malware is now being targeted to Android devices via compromised Web sites, a first in the mobile world, says security firm Lookout. View full post on malware – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms

read more

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email?

April 30, 2012 Author: Category: Greg's Blog

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email? View full post on Twitter / 2600 View full post on National Cyber Security

read more

Global Cyber Warfare Market – Spending on Systems Expected to Remain Robust through 2021

February 29, 2012 Author: Category: Greg's Blog

DALLAS, February 29, 2012 /PRNewswire/ –ReportsnReports adds new market research report 'The Global Cyber Warfare Market 2011-2021' to its store. The formation of the US Cyber Command or USCybercom by … View full post on china cyber wars – Yahoo! News Search Results View full post on National Cyber Security

read more

Mobile users easily tracked through GSM network leaks

February 20, 2012 Author: Category: Greg's Blog

GSM cellular networks leak enough location data to give third-parties secret access to cellphone users’ whereabouts, according to new research from the US. “We have shown that there is enough information leaking from the lower layers of the GSM communication stack to enable an attacker to perform location tests on…

read more

Scammers target investors through social media sites

February 15, 2012 Author: Category: Greg's Blog

Recommend this story? I thought I had made the perfect friend on Facebook. She liked all the same books and movies I did and we had some really entertaining exchanges over email. View full post on social media scam – Yahoo! News Search Results View full post on National Cyber…

read more

Google Wallet PIN vulnerable through brute-force attack

February 11, 2012 Author: Category: Greg's Blog

Google Wallet, the new NFC system that purports to turn your phone into a credit card, can be compromised using a brute-force attack – and that raises questions about its security. Security firm Zvelo has discovered that the Google Wallet PIN, which is required of users to confirm purchases made…

read more

Investors warned of possible securities frauds through social media

January 28, 2012 Author: Category: Greg's Blog

As more and more investors use social media websites to research where to invest their money, fraudsters are increasingly using those very sites to entice them. View full post on social media scam – Yahoo! News Search Results View full post on National Cyber Security

read more

Amazing “Stock Alerts” Navigate Through Earnings Season With 96+% Profitability

January 27, 2012 Author: Category: Greg's Blog

SANTA CLARA, CA– – The BullTrade.com "Stock Alert" service has been on an epic winning streak since its inception over 14 years ago. Over the past nine years, over 96% of all closed-out trades … View full post on computer security alerts – Yahoo! News Search Results View full post…

read more

Fake iPhone app snuck through Apple approval process

January 24, 2012 Author: Category: Greg's Blog

Apple let a fake app slip through its approval process for the iOS App Store, the makers of the popular Camera+ program said over the weekend. Security researchers who noted the slip-up did not know whether the bogus app contained malware because they had been unable to grab a copy…

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved