­

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

NETGEAR: Puzzle #4 is LIVE! Guess this title that you can stream to your TV using our NeoTV: http://t.co/Ib7vCimx #stream4joy

May 7, 2012 Author: Category: Greg's Blog

NETGEAR: Puzzle #4 is LIVE! Guess this title that you can stream to your TV using our NeoTV: http://t.co/Ib7vCimx #stream4joy View full post on Twitter / NETGEAR View full post on National Cyber Security

read more

How to Change Your WordPress Blog Password Using phpMyAdmin

May 5, 2012 Author: Category: Greg's Blog

How to Change Your WordPress Blog Password Using phpMyAdmin View full post on National Cyber Security

read more

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email?

April 30, 2012 Author: Category: Greg's Blog

2600: @BlueSwirl Sounds like a PayPal issue – can you verify the charge went through & that you’re using the right email? View full post on Twitter / 2600 View full post on National Cyber Security

read more

SPOOFEM: @ChrisJohnRiley @GregoryDEvans. It is a matter of preference. I see more people using Facebook that Twitter. You can get your message out!

April 29, 2012 Author: Category: Greg's Blog

SPOOFEM: @ChrisJohnRiley @GregoryDEvans. It is a matter of preference. I see more people using Facebook that Twitter. You can get your message out! View full post on Twitter / SPOOFEM View full post on National Cyber Security

read more

Accidentally invented – Dos attack using Google Spreadsheets

April 28, 2012 Author: Category: Greg's Blog

Panos Ipeirotis, a computer scientists working at New York University,attack on his Amazon web service using Google Spreadsheets and Panos Ipeirotis checked his Amazon Web Services bill last week – its was $1,177.76 !<!– adsense –> He had accidentally invented a brand new type of internet attack, thanks to an…

read more

Using the Earth as an Energy Source for Earth Day

April 22, 2012 Author: Category: Greg's Blog

Note: I forgot that today was Earth Day. Instead of creating a new post, I will repost (recycle) one of my much older posts. Everyone knows that very soon, we will all have our own Mr. Fusion devices in our cars and homes. But until that time, is there any…

read more

Stuxnet worm reportedly planted by Iranian double agent using memory stick

April 12, 2012 Author: Category: Greg's Blog

The Stuxnet computer worm used to sabotage Iran's nuclear program was planted by a double agent working for Israel. The agent used a booby-trapped memory stick to infect machines deep inside the Natanz nuclear facility, according to a report published on Wednesday. Once the memory stick was infected, Stuxnet was…

read more

Cloud payroll services the target of cybercriminals using Zeus malware

April 11, 2012 Author: Category: Greg's Blog

Cybercriminals are using the Zeus online banking malware to target companies that use cloud-based payroll services, according to researchers from security firm Trusteer. The researchers have come across a Zeus configuration that monitors the log-in web page of a Canadian provider of human resources and payroll services called Ceridian Canada,…

read more

Using the internet lands ‘hacker’ back in prison

April 1, 2012 Author: Category: Greg's Blog

Mr Cleary, 19, is accused of being a member of the hacktivist group LulzSec as it carried out a series of attacks on targets including the UK’s Serious Organised Crime Agency, the CIA and News International. A court heard that he had contacted the former LulzSec leader Hector Xavier Monsegur…

read more

Spoofers Using Caller ID To Trick Call Recipients

March 25, 2012 Author: Category: Greg's Blog

KOCO Eyewitness News 5 has a warning for Oklahomans before they answer their next phone call. View full post on caller id spoofing – Yahoo! News Search Results View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved