Industry-wide, cyber security defenders are struggling to keep pace with increasingly advanced (and well-funded) criminal campaigns. These campaigns have substantial, bottom-line impacts and require rapid response with advanced counter-measures. These criminal campaigns are called Advanced Persistent Threats,Many organizations have sound fundamental cyber security capabilities. However, advanced persistent threat (APT) tactics require more agile and advanced defenses. Organizations must continue the fundamentals while adding more advanced and complimentary capabilities. New technologies and methodologies are needed to detect, prevent and respond to threats in near real-time.
To explore the full article, please open the attached pdf.
Authored by Vikas Kumar
TCS Enterprise Security and Risk Management
Steganography is the practice of hiding a message or a file within another file so that only the sender and receiver know of its existence. It may also involve the use of cryptography, where the secret message/file is encrypted before being hidden. The objective is to ensure that transmission of secret data remains unsuspected and undetectable. Unlike encrypted files, steganographically hidden messages do not attract attention or arouse suspicion.
Steganography is both an art and a science. As a science it has evolved with advancement in technology, hiding techniques & tools, and as an art it has evolved with ingenuity of man. This advancement has made it easy for anyone to practice it from anywhere on the planet.
This article presents an approach to examine whether a website allows support for steganographically hidden content by evaluating a varied mix of social media sites, image hosting sites, media sites and a few easily available steganography tools.