Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Valve confirms Steam user forums and database hacked

November 10, 2011 Author: Category: Greg's Blog

It turns out that the recent Steam forum breach is more serious than originally thought. Head of Valve Gabe Newell issued a statement today apologizing for the inconvenience and confirming that, along with the forums, the Steam database had been compromised. View full post on hacking tools – Yahoo! News…

read more

Facebook Adds Security Tools to Protect User Accounts From Hacker Takeovers

November 10, 2011 Author: Category: Greg's Blog

Facebook is testing out two new security features to help users protect their accounts from being compromised by malicious third-party apps or hackers. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Double whammy: New Mac Trojan spies on user, uses GPU

October 31, 2011 Author: Category: Greg's Blog

A new malware targeting computers running Apple’s Mac OS X system packs a double whammy: it spies on the user, and uses the computer’s graphics processing unit to mine for Bitcoins. Computer security firm Sophos said the malware — aptly dubbed DevilRobber (a.k.a. OSX/Miner-D) — comes with copies of an…

read more

Sony suffers another security scare – 93,000 user accounts broken into

October 13, 2011 Author: Category: Greg's Blog

Hackers successfully broke into 93,000 accounts at Sony over the last few days, once again impacting users of the Sony Entertainment Network, PlayStation Network (PSN) and Sony Online Entertainment services. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Facebook API abuse can expose private user data, say hackers

October 7, 2011 Author: Category: Greg's Blog

But Facebook says it is happy with its current protection measures Facebook is ignoring a serious shortcoming in the way it limits application developers’ access to information about Facebook users, according to a pair of hackers. The problem is in the way Facebook’s APIs (application programming interfaces) work, and could…

read more

Mac OS X Lion vulnerability lets attacker change user password

September 22, 2011 Author: Category: Greg's Blog

A flaw in one of Mac OS X Lion’s command-line utilities has potentially opened a route for an attacker to change a user’s password without knowing the current password. But how big of a concern is it? The issue in question was first brought to light by Patrick Dunstan, author…

read more

LIGATT: Which one of the following best describes authentication? A. a user claiming an identity to an information system

November 17, 2010 Author: Category: Greg's Blog

LIGATT: Which one of the following best describes authentication? A. a user claiming an identity to an information system View full post on Twitter / LIGATT

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved