The Latest in IT Security

Posts Tagged ‘steganography’

Steganography, or the practice of concealing a file, message, image or video within another file, message, image or video, may be an older technique, but it continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight. In 2017, IBM X-Force has identified three different malware samples in network […]

Read more ...

Endgame details ‘Instegogram’ and Apple Mac OS X flaw with Instagram images. Researchers have developed a proof-of-concept attack that uses steganography to establish highly covert malware command and control channels on the Instagram social media network. Read More

Read more ...

Cybercriminals operating Lurk malware dropper are currently hiding malicious data inside images, leveraging what is called steganography, a stealth technique that in digital world allows embedding data in image, video or audio files. The malware relies on an algorithm designed to lace pictures with links pointing to the command and control server, in encrypted form. […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments