Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

HTTPS SSL encryption Vulnerable To Crypto Attack

September 25, 2011 Author: Category: Greg's Blog

Article source: http://feedproxy.google.com/~r/TheHackersNews/~3/DW1DnJASWX4/https-ssl-encryption-vulnerable-to.html View full post on National Cyber Security

read more

Mac OS X vulnerable to new PDF trojan malware

September 23, 2011 Author: Category: Greg's Blog

Although Macs have the squeaky clean image of being malware-free, things may start to change as the platform gets increasingly more popular. Researchers at F-Secure and Sophos have discovered a new trojan horse malware that targets Mac OS X and is disguised as a PDF file. The malware was first…

read more

United States Navy Military domain is vulnerable to hackers

September 17, 2011 Author: Category: Greg's Blog

Article source: http://feedproxy.google.com/~r/TheHackersNews/~3/Fgfo3BNZIDc/united-states-navy-military-domain-is.html View full post on National Cyber Security » Computer Hacking

read more

Google Web History vulnerable to new Firesheep hack

September 10, 2011 Author: Category: Greg's Blog

Two researchers have shown how a modded version of the Firesheep Wi-Fi sniffing tool can be used to access most of a victim’s Google Web History, a record of everything an individual has searched for. The core weakness discovered by the proof-of-concept attack devised by Vincent Toubiana and Vincent Verdot…

read more

Microsoft Windows Update not vulnerable to DigiNotar SSL hack

September 7, 2011 Author: Category: Greg's Blog

Microsoft says that a digital certificate stolen from Dutch company DigiNotar could not be used to force-feed customers malware through its Windows Update service. The company’s assertion came after a massive theft of more than 500 SSL (secure socket layer) certificates, including several that could be used to impersonate Microsoft’s…

read more

AES encryption vulnerable to attack, claim Microsoft researchers

August 19, 2011 Author: Category: Greg's Blog

Researchers from Microsoft and the Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications. The attack can recover an AES secret key three to five times faster than previously thought…

read more

Theft via text: Cars vulnerable to hack attacks

August 19, 2011 Author: Category: Greg's Blog

Anti-theft mechanisms susceptible to overrides via cell phone, putting vehicles at risk View full post on hacking tools – Yahoo! News Search Results View full post on National Cyber Security Gergory Evans

read more

Dukascopy: Forex Swiss Bank Vulnerable to SQL Injection

July 6, 2011 Author: Category: Greg's Blog

Article source: http://feedproxy.google.com/~r/TheHackersNews/~3/soD-mGkdCUI/dukascopy-forex-swiss-bank-vulnerable.html View full post on National Cyber Security » Computer Hacking

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved