Home > Articles > Security > Network Security

  • Print
  • + Share This
Like this article? We recommend

Don't Be an Unwitting Collaborator

Although some research indicates that terrorists are not using advanced computer tools to hide messages in innocuous-looking web images, others believe that methods used by the "doubting Thomases" were particularly aimed at uncovering use of steganographic tools already released on the Internet. Critics of the research state that there are more advanced methods of hiding communications within images that involve using active as well as redundant parts of the underlying code.

Whatever the case, people inside your organization may be using steganographic methods to exchange messages and secrets, and it's up to you to guard against the use of your resources for malicious purposes.

  • + Share This
  • 🔖 Save To Your Account