This alert may not be shared outside your organization, Do Not Repost or send, place on other websites, List servers, or send to others via email, including other associations or parties.  Members and Law enforcement use only. Contact us for any permissions.  To do otherwise will result in the loss of membership.

Complete Story
 

02/06/2018

What do you need to know about Stegware

IDG Connect

Post-mortems on recent cyberattacks reveal determined attackers are turning to steganography, the covert hiding of data within seemingly innocuous files. It’s a way of encoding a secret message inside another message, called the carrier, with only the desired recipient able to read it. Steganography has long been used to communicate without the authorities finding out, but now Stegware, the weaponization of steganography by cyber attackers, is on the rise. This is bad news for IT professionals using tools that identify unsafe data since steganography is impossible to detect.

 

How does Stegware work?

Messages are normally encoded by arranging data as a sequence of symbols. The symbols are obvious, even if you don’t know what they mean. However, with steganography the symbols representing the message are unusual and go unnoticed by everyone except the recipient who knows exactly what to look for.

Read more...

Printer-Friendly Version


Resources

Alerts

The FRPA alert system distinguishes us from other groups by gathering and providing information to law enforcement, retailers AND financial institutions.

more information
Resources

Resources

Your electronic library to help in fighting financial fraud for all of our partners.

more information