Home Search
steganography - search results
If you're not happy with the results, please do another search
How to Prevent Steganography Attacks
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...
What Is Steganography and Its Popular Techniques in Cybersecurity?
The word steganography stems from the Greek origin “steganos” (secret) and “graphy” (writing or drawing), which loosely translates to hidden writing. It is a...
Hackers Using Steganography to Target Industrial Enterprises: Kaspersky
Security experts from Kaspersky have warned about a series of attacks targeted at distributors of equipment and software for industrial enterprises globally to steal...
Hackers Using Steganography in WAV Audio Files to Hide Malware
Steganography, an ancient practice of hiding secret content and text messages inside non-suspicious messages, is being increasingly used by cybercriminals to attack businesses around...
Hackers using steganography to spread Powload Malware: Research
A recent survey revealed that the uptick of macro malware in the first half of 2018 was due to Powload malware, which was circulated...
Cybercriminals using Steganography in their attacks: Researchers
Steganography, an ancient practice of hiding secret content and text messages inside non-suspicious messages, is being increasingly used by cybercriminals to attack the businesses...
6 Anti-Forensic Techniques That Every Digital Forensic Investigator Dreads
Anti-forensics techniques are designed to frustrate digital forensics investigators. They comprise tact and tools to hoodwink digital forensics investigation. Besides, cybercriminals use anti-forensics tools...
Challenges and Applications of Digital Forensics
Crimes committed within the electronic or digital domains, particularly within cyberspace, have become general. They use technology as a footprint, commit offenses, and create...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Process Ghosting: A New Executable Image Tampering Technique in the Wild
In addition to advancing hacking strategies, cybercriminals often try different tactics to evade security detections. In one such tactic discovered recently, security researchers from...