­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Spoofers Using Caller ID To Trick Call Recipients

March 25, 2012 Author: Category: Greg's Blog

KOCO Eyewitness News 5 has a warning for Oklahomans before they answer their next phone call. View full post on caller id spoofing – Yahoo! News Search Results View full post on National Cyber Security

read more

Store warning over PayPoint con trick

March 12, 2012 Author: Category: Greg's Blog

A ‘CLEVER’ credit card scam sweeping the country has landed in Weston, costing one shopkeeper hundreds of pounds. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security

read more

Chrome 17 beta boosts malware defenses and learns a new speed trick

January 6, 2012 Author: Category: Greg's Blog

In recent times all the major web browsers have made serious leaps in terms of speed thanks to improvements in HTML parsing, JavaScript engines, and the arrival of hardware accelerated rendering. As differences in performance become less apparent, it’s becoming more and more important for companies like Google and Microsoft…

read more

SpyEye Malware Borrows Zeus Trick to Mask Fraud

January 4, 2012 Author: Category: Greg's Blog

A powerful bank-fraud software program, SpyEye, has been seen with a feature designed to keep victims in the dark long after fraud has taken place, according to security vendor Trusteer. SpyEye is notable for its ability to inject new fields into a Web page, a technique called HTML injection, which…

read more

Hacker cloaking malicious files with Windows extension trick

September 8, 2011 Author: Category: Greg's Blog

Hackers are using a new trick to cloak malicious files by disguising their Windows file extensions to make them appear safe to download, a Czech security company warned today. The exploit, dubbed “Unitrix” by Avast Software, abuses Unicode for right-to-left languages, such as Arabic or Hebrew, to mask Windows executable…

read more

Cybercriminals trick Windows users into paying £88 in “ransomware” scam

September 7, 2011 Author: Category: Greg's Blog

Cybercriminals are trying to trick Windows users into paying £88 ($143) by claiming that they’re running a counterfeit copy of the operating system, a security expert said today. The scam, a kind dubbed “ransomware” for the way criminals try to extort money, poses as a message from Microsoft that alleges…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved