The Steg Chronicles: Information Hiding 101

(image credit: EC Council)

Real-Life Historical Instances of Information Hiding

Magecart stegware malicious code (image credit: Bleeping Computer)

Great, But How Do I Actually Hide Information?

Additional Resources

References

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

IIoT Security for electronics

NodeJs Apps security Checklist

Origin Protocol has set a $ 1 million reward

Git Vultures: The Bots That Are Stalking Your Git Repositories

Best Eset Password Manager alternative

Identity cards being introduced in the UK and elsewhere may be an unintended consequence of…

My God, who will save IT operations? certcollection ccie rcertcollection ccie rs

How to get started with Wordpress Security?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
κ§π“Šˆπ’†œπŸ†‰3πŸ†πŸ…ΎπŸ†ƒπŸ†πŸ†„πŸ†‚πŸ†ƒπ’†œπ“Š‰κ§‚

κ§π“Šˆπ’†œπŸ†‰3πŸ†πŸ…ΎπŸ†ƒπŸ†πŸ†„πŸ†‚πŸ†ƒπ’†œπ“Š‰κ§‚

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Cybersecurity incidents in NZ for the 4th quarter of 2021

Who did call a runtime broker, and why is it running on my computer?