Posts Tagged ‘steganography’

Most Recent
 
Read More
2017-11-17

A Safe Haven for Malware

Steganography is a science that studies the ways of hidden transmission of information by hiding the very fact of transmission. Science is absolutely not new in its idea, but with the invention of digital ways of implementing algorithms used in it, its development has reached an essentially new level. Three different samples of malicious programs in network attacks containing tools for intellectual analysis of crypto-currency, hidden in forged image files were identified in 2017.

 

84
 
Read More
2017-01-07

Steg Brute Force Tool V1.0 is available now

Lydecker Black shared info about Steg Brute Force Tool “Steghide – Brute Force Attack to Find Hide Information and Password in a file”. The tool can recover passwords of StegHide and help you find hidden data.

 

993
 
Read More
2016-10-05

Steganography… what is that?

It’s about ‘steganography’. Steganography literally means “covered writing”. Steganography is an ancient art of covering messages. Usually, the data is concealed inside an innocuous cover so that even if a third party discovers the cover, there are no suspicions about the data hiding inside the cover. If the hidden data is detected by a third party the steganography technique fails.

529
 
Read More
2016-08-22

A Mobile Forensic Investigation into Steganography

He is an interesting presentation by Catrin Burrows & Pooneh Bagheri Zadeh from De Montfort University on steganography in the context of mobile forensic investigations.

371
Latest Headlines
 
Read More
673
 
Read More
373
 
Read More
750

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics