Home Search

steganography - search results

If you're not happy with the results, please do another search
Steganography in cybersecurity

What Is Steganography and Its Popular Techniques in Cybersecurity?

The word steganography stems from the Greek origin “steganos” (secret) and “graphy” (writing or drawing), which loosely translates to hidden writing. It is a...
Hackers Using Steganography to Target Industrial Enterprises

Hackers Using Steganography to Target Industrial Enterprises: Kaspersky

Security experts from Kaspersky have warned about a series of attacks targeted at distributors of equipment and software for industrial enterprises globally to steal...
Steganography attack

Hackers Using Steganography in WAV Audio Files to Hide Malware

Steganography, an ancient practice of hiding secret content and text messages inside non-suspicious messages, is being increasingly used by cybercriminals to attack businesses around...

Hackers using steganography to spread Powload Malware: Research

A recent survey revealed that the uptick of macro malware in the first half of 2018 was due to Powload malware, which was circulated...
Steganography attack

Cybercriminals using Steganography in their attacks: Researchers

Steganography, an ancient practice of hiding secret content and text messages inside non-suspicious messages, is being increasingly used by cybercriminals to attack the businesses...
Anti-forensic techniques

6 Anti-Forensic Techniques That Every Digital Forensic Investigator Dreads

Anti-forensics techniques are designed to frustrate digital forensics investigators. They comprise tact and tools to hoodwink digital forensics investigation. Besides, cybercriminals use anti-forensics tools...
digital forensics, cyber forensics, forensics

Challenges and Applications of Digital Forensics

Crimes committed within the electronic or digital domains, particularly within cyberspace, have become general. They use technology as a footprint, commit offenses, and create...
cyberthreats, bug

Everything You Need to Know About the Evolution of Cyberthreats

The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Malware and Vulnerability Trends Report, Mobile malware threats

Process Ghosting: A New Executable Image Tampering Technique in the Wild

In addition to advancing hacking strategies, cybercriminals often try different tactics to evade security detections. In one such tactic discovered recently, security researchers from...

Attackers Using Taylor Swift Image to Hide Malware Payloads

Security researchers discovered that cryptocurrency-mining botnet operators were using pop singer Taylor Swift’s image to hide their malware payloads. The botnet, dubbed as MyKingz,...

MOST POPULAR

RECENT POSTS