Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Palo Alto WildFire firewall upgrade closely inspects network traffic

November 9, 2011 Author: Category: Greg's Blog

Palo Alto Networks is upgrading its firewall products with a capability to precisely identify outbound traffic generated by malware, which the company calls WilfFire and says will help if the malware is undetected at first and starts running on a computer. WildFire will be distributed as a free upgrade for…

read more

Interest in IPv6 booms despite puny traffic levels

October 27, 2011 Author: Category: Greg's Blog

The importance of IPv6 could at last be getting through to ISPs and their business customers, a survey from the Number Resource Organisation (NRO) has found. The recent snapshot by the NRO (an organisation representing Internet registries) of 1,600 ISPs and businesses across the globe underlines that IPv6 is still…

read more

HTCS1: The ATM Industry is working to fight cybercrime and there’s a FBI traffic ticket scam warning. Read more at http://t.co/WfkrmDhP

October 19, 2011 Author: Category: Greg's Blog

HTCS1: The ATM Industry is working to fight cybercrime and there’s a FBI traffic ticket scam warning. Read more at http://t.co/WfkrmDhP View full post on Twitter / HTCS1

read more

Devices That Can Listen In on Cellphone Traffic, Control Your Phone

October 4, 2011 Author: Category: Greg's Blog

Law enforcement and military officials are increasingly using devices to locate people via their cellphones, even when the phones aren’t in use. But finding people isn’t all that this type of gear can do View full post on cellphone security – Yahoo! News Search Results View full post on National…

read more

Beware of The Traffic Ticket Trojan [WARNING] (Mashable)

August 18, 2011 Author: Category: Greg's Blog

Mashable – Got a suspicious looking email that claims you need to pay a speeding ticket in New York? Whatever you do, don’t open it — and definitely don’t open the attachment it says you need to print out in order to pay. The email, uncovered by security firm Sophos,…

read more

LIGATT: Which of the following is a type of network attack? A. Network Analysis B. Eavesdropping C. Traffic Analysis D. Packet Replay

November 23, 2010 Author: Category: Greg's Blog

LIGATT: Which of the following is a type of network attack? A. Network Analysis B. Eavesdropping C. Traffic Analysis D. Packet Replay View full post on Twitter / LIGATT

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved