Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form

Steganography: the art of concealment

Posted on January 12, 2016January 24, 2016 By Davey Winder

Don’t think of this ‘concealment methodology’ as somehow being a toy technology, steganography is a mature security tool with plenty to offer.

Here at IT Security Thing we are in no doubt that the use of steganography, or at least steganographic techniques in the broadest sense, will continue to be exploited by attackers for as long as there is a payoff in it. That payoff, be it hiding malware distribution, disguising command and control centre commands or obfuscating confidential and encrypted communications, is simply hiding all of the above in plain sight. So how do you defend against the steganography threat? Good question, and the best answer comes wrapped in the protective blanket of best practise that is a layered approach to security.

Click here to read complete article

Privacy Tags:Analysis, Privacy, Research, Steganography

Post navigation

Previous Post: Comcast XFINITY flaw sounds Internet of Things security alarm
Next Post: Reducing the security software attack surface

Related Articles

New Samsung 0-Click Security Threat Alert, Disable Wi-Fi Calling Now Android
New Gmail Encrypted Email Feature Confirmed By Google, Will You Get It? Announcements
Can Calling *#21# Reveal FBI iPhone Wiretap? Android
Has A ‘Hacker’ With Your Password Really Recorded You Watching Porn? Cybercrime
What Twitter Users Need To Know About Mastodon Privacy Analysis
Is Elon Musk Bringing Encrypted Messages To The $8 Twitter Blue Party? Analysis

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government hack Hackers Hacking healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Threatscape Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2023 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy