Security Information |
|
Steganography - The Art Of Deception & Concealment
The Message Must Get Through You send for a messenger, who is in reality a Roman slave. The messenger's head is shaved clean, and the message for the outpost is tattooed on his head. Several weeks later, the messengers hair has grown in and completely concealed the secret information. The messenger departs and one week later reaches the outpost. A quick head shave and the outpost has the information needed to ensure yet another victory for Rome. This is one of the earliest forms of Steganography on record. The art of hiding messages within another medium and avoiding detection. The Ancient Technology Of Deception There are several programs on the Internet that may be able to detect a small anomaly in the picture, like "stegdetect", but the method used to embed the secret document is protected by a key, or password, as well. The technology behind effective Steganography is quite complex and involves serious mathematical computations. Computers and technology make this a trivial task and make this art of deception a serious threat to the security of information. Company's that regard their information proprietary, and rely on the security and integrity of their intellectual property, could be at significant risk. A Real World Example Of Steganography But how many organizations block the sending of image files like, .jpg or .bmp images. Imagine having someone on the inside of a company who secures a proprietary document. This person then embeds the document into a picture and sends it to an e-mail address on the Internet. The company's defense systems block many types of file attachments, but image files are not considered a risk, so they are allowed through. The sender and receiver previously agreed on the method and type of deception. Using a Steganography package freely available on the Internet the task was easily and securely executed. The company was completely unaware of the fact that important information was leaked. Conclusion Steganography also has an impact on non-digital information as well. And, pictures are not the only medium that can be used. Sound files are another favorite host for embedding secret information. If you would like to see Steganography in action you can download "The Third Eye" from the following link http://www.defendingthenet.com/downloads/steg.zip. It is a freely distributable Steganography program and was used to create the two image examples referenced above. This download contains the two images above and you will be able to open the image with the hidden text and extract it. The zip file contains a README.TXT file that will give you full instructions on how to extract the hidden text in the image. But first, you will need the password! Can you guess it? I'll give you a clue: What form of deception did the Roman General use to send his message?** *The story "The message must get through" although based on documented information about a Roman General performing such an act of deception, is fictional and was written as illustration of such an event strictly for use in this article. **You should be able to easily guess the password however I must point out that the password should be entered all "lower-case". About The Author Original URL
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters.com Mitt Romney defends Trump's border security policy, slams Biden in heated exchange with MSNBC host Fox News Donald Trump to visit St. Paul. What are the security expenses? St. Paul Pioneer Press House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Women are worried about their financial security. That may affect the 2024 presidential election CNBC Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Is AI the future of school security systems? Yahoo! Voices EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations FCC proposes BGP security measures Network World Security Council Secretary: 'Not an Inch of Armenian Land Ceded to Azerbaijan' • MassisPost Armenian News by MassisPost Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review Canada Releases Defense Policy Update to Boost Security Department of Defense NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review RSA Conference 2024: AI and the Future Of Security Security Boulevard Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post Votiro Keeps Up the Momentum in 2024 Security Boulevard UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State North Korea IT Worker Scam Brings Malware and Funds Nukes Security Boulevard The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations The Dell API Breach: It could have been prevented Security Boulevard Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard University Park Mall to increase security precautions after shooting South Bend Tribune USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando Friends and co-workers gather to remember security guard killed outside Exchange nightclub WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Making Safety and Security Intrinsic to School Design Campus Security Today 'We've heard enough from you generals': Ben Gvir, Eisenkot spar in security cabinet meeting The Times of Israel U.S. Security Cooperation with Ukraine - United States Department of State Department of State Galaxy Tab S9 lineup gets Android's May 2024 security update SamMobile - Samsung news Belgium cuts off ticket sales for soccer match against Israel over ‘security concerns’ The Times of Israel Security fog machine helps deter burglars from Chatsworth business FOX 11 Los Angeles |
RELATED ARTICLES
Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Spyware Symptoms Spyware symptoms happen when your computer gets bogged down with spyware programs running in the background without your knowledge. Spyware, adware, malware and even spamware can cause your computer to behave very strange. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. Is Adware - Spyware Putting Your Privacy at Risk Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. |
home | site map |
© 2006 |