Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Researchers break video Captcha security using robot vision

February 21, 2012 Author: Category: Greg's Blog

Researchers at Stanford University have discovered a way to break state-of-the-security video Captchas of the sort deployed by companies such as NuCaptcha with a 90 percent success rate. Rather than presenting users with a conventional static but scrambled series of letters and numbers, NuCaptcha’s video version offers partially rotating text…

read more

Using SSAE 16 standard, SOC reports to assess cloud provider security

February 21, 2012 Author: Category: Greg's Blog

The SAS 70 report has been replaced by the SSAE 16, but how does it stack up as a tool to measure a provider?s security? View full post on SearchCloudSecurity: RSS Feed View full post on National Cyber Security

read more

US using ‘latest tools’ for cybersecurity: Napolitano

January 31, 2012 Author: Category: Greg's Blog

WASHINGTON (AFP) – US officials are deploying "the latest tools" to keep cyberspace safe for commerce and protect the US information infrastructure, Homeland Security Secretary Janet Napolitano said. View full post on cyber security alerts – Yahoo! News Search Results View full post on National Cyber Security

read more

Taking Action: Morgan County Woman Warns of Scam After Using Credit Card to Place Puppy Ad

January 25, 2012 Author: Category: Greg's Blog

The Huntsville Times confirms they've contacted Huntsville Police A Morgan County woman, who placed an ad in The Huntsville Times, says she stumbled onto a scam that police are now investigating. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security

read more

Taking Action: Morgan County Woman Warns of Scam After Using Credit Card to Place Ad

January 23, 2012 Author: Category: Greg's Blog

The Huntsville Times confirms they've contacted Huntsville Police. A Morgan County woman, who placed an ad in The Huntsville Times, says she stumbled onto a scam that police are now investigating. View full post on credit card scam – Yahoo! News Search Results View full post on National Cyber Security

read more

Cyber-Attacks Against Israel May Be Using Anonymous Facade

January 20, 2012 Author: Category: Greg's Blog

The world may be seeing the first glimpse of cyberterrorism as the rhetoric around cyber-attacks between Arab hackers and Israeli hackers heats up. View full post on cyber terrorism – Yahoo! News Search Results View full post on National Cyber Security

read more

Decoding ROT using the Echo and Tr Command in the Terminal

December 29, 2011 Author: Category: Greg's Blog

In this tutorial we will use the ‘echo’ and ‘tr’ commands in order to encode and decode letters using ROT which is known as the Caesar Cipher. ROT means ROTation thus it is used to encode letters in the alphabet to its next letter. There are 25 possible ROT settings…

read more

Anonymous makes charitable donations using stolen credit card details

December 26, 2011 Author: Category: Greg's Blog

Hacktivist collective Anonymous appears to have been making charitable donations to a number of organizations using credit card information stolen from US-based security think tank Stratfor. View full post on bank security hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

HTCS1: People in poorer countries are using social media more often. Listen to more at http://t.co/R2gDtWRm

December 23, 2011 Author: Category: Greg's Blog

HTCS1: People in poorer countries are using social media more often. Listen to more at http://t.co/R2gDtWRm View full post on Twitter / HTCS1

read more

What Technologies Banks Should Be Using to Keep Your Money Safe

December 16, 2011 Author: Category: Greg's Blog

A look at security-related banking tools that guard your business from fraud. View full post on computer security alerts – Yahoo! News Search Results View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved