Steganography When we were looking at steganography cyber attacks – hiding malicious code inside for instance image files – I was surprised just how much malware could be hidden without degrading the image. Here is a real-world example of this rare type if attack, spy are code embedded in a …
Cold War spying is a long way from today’s cyber-espionage weapons but they both successfully stole information – #BeCyberSmart
This article comes via Bruce Schneier, and fits nicely into the Weekend Project – it is about security and has some connections to the posts we run here at Smart Thinking. Both Clive and I have attended Bruce Schneier speaking events, and through Clive’s links with Edinburgh Napier University have …
Spyware across Europe
Here is a great weekend read, which I found very interesting: It is an excellent article by Morgan Meaker at Wired UK, examining the apparent plague of spyware, being discovered on the smartphones of activists, journalists and politicians, across Europe Spyware Scandals Are Ripping Through Europe | WIRED UK All …
Mercenary Spyware
“Spyware is huge threat to global human rights and democracy, expert warnsCybersecurity expert Ron Deibert to testify to Canadian MPs about troubling spread of invasive surveillance tools” Leyland Cecco – The Guardian Spyware is huge threat to global human rights and democracy, expert warns | Canada | The Guardian
Spyware is not an easy way to make a living…
…unless you are a company promising only to sell the spyware to approved governments and law enforcement. Australian spyware developer charged after 14,500 sales • The Register