Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Hackers’ modular worm builder hoses popular team web chat apps

November 19, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans KIWICON Hackers everywhere can now more easily compromise popular chat apps to steal users’ webcam and audio feeds using a worm framework published online – and they even have a new zero day to help the plundering. The framework, dubbed The…

read more

New backdoor worm found attacking websites running Apache Tomcat

November 24, 2013 Author: Category: Greg's Blog

  Researchers have identified new self-replicating malware that infects computers running the Apache Tomcat Web server with a backdoor that can be used to attack other machines. Java.Tomdep, as the backdoor worm has been dubbed, is Java Servlet-based code that gives Apache Tomcat platforms malicious capabilities. It causes infected machines to maintain Internet…

read more

TEHRAN: Iran’s Analysis on Stuxnet Cyber Worm Attack! Part 3/3 Oct 5, 2010

July 29, 2012 Author: Category: Greg's Blog

Iran has been hit by one of the most sophisticated computer viruses ever designed. Stuxnet is a computer worm that could be the first in a new generation of malicious software or malware. According to experts, this was no ordinary amateur job and whoever did this had a very specific…

read more

TEHRAN: Iran’s Analysis on Stuxnet Cyber Worm Attack! Part 2/3 Oct 5, 2010

July 29, 2012 Author: Category: Greg's Blog

Iran has been hit by one of the most sophisticated computer viruses ever designed. Stuxnet is a computer worm that could be the first in a new generation of malicious software or malware. According to experts, this was no ordinary amateur job and whoever did this had a very specific…

read more

Stuxnet Virus Worm – Cyber Attack False Flag by Iran

July 29, 2012 Author: Category: Greg's Blog

The Stuxnet computer virus is a worm designed to control, modify and potentially destroy specific Siemens SCADA systems and has infected more than 90000 computers to date. A third of the Stuxnet computer virus infections have taken place in Iran and some of the computers within the Bushehr Nuclear facility…

read more

TEHRAN: Iran’s Analysis on Stuxnet Cyber Worm Attack! Part 1/3 Oct 5, 2010

July 29, 2012 Author: Category: Greg's Blog

Iran has been hit by one of the most sophisticated computer viruses ever designed. Stuxnet is a computer worm that could be the first in a new generation of malicious software or malware. According to experts, this was no ordinary amateur job and whoever did this had a very specific…

read more

Netcat Computer WoRm – (Cyber Espionage Tool) *

July 16, 2012 Author: Category: Greg's Blog

This is a Computer Worm called “Netcat Computer WoRm” which is just as cool as the Flame Virus! With Netcat backdoor I can get ScreenShots and Keystrokes and access over targets PC! Program Features: 1. Netcat Backdoor Payloads 2. Network […] ↓ Read the rest of this entry… View full…

read more

Facebook spreading cross-browser LilyJade worm, security experts warn

May 22, 2012 Author: Category: Greg's Blog

Crossrider, a cross-browser extension development framework, is being used to malware writers to build a click-fraud worm called LilyJade that spreads on Facebook, security researchers from antivirus firm Kaspersky Lab warned. View full post on Techworld.com … View full post on National Cyber Security

read more

Worm Posts on SNS Sites and Wipes out Rivals

May 19, 2012 Author: Category: Greg's Blog

W32.Wergimog is a worm that attempts to spread through removable drives and opens a back door. When I looked into its variants, I found an interesting sample, which I named W32.Wergimog.B. Both samples are based … View full post on National Cyber Security

read more

Worm Posts on SNS Sites and Wipes out Rivals

May 19, 2012 Author: Category: Greg's Blog

W32.Wergimog is a worm that attempts to spread through removable drives and opens a back door. When I looked into its variants, I found an interesting sample, which I named W32.Wergimog.B. Both samples are based … View full post on National Cyber Security

read more

Posts navigation

Older posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved