Steganography: What's the Real Risk?

by John Hally
Sept. 1, 2017 1 comment SANS Institute Encryption & Authentication steganography

This paper provides an overview of steganography, tools of the trade and detection methods.

Irina Alexandra Negrii 7 months, 2 weeks ago

well...hackers use the steganography to infiltrate computer systems. The technique has since evolved from tattoos to invisible inked letters to flurries of data packets. By altering small bits of data in a file such a JPEG or in packets of voice data, they can send secret information and viruses