Steganography is used by hackers to hide overtly hide data. Hiding data overtly does not raise suspicion, because no one knows there is something hidden. A common example of steganography is hiding an image inside another image. Watermarking can also be considered steganography, if the watermark is not visible.
In this post, we’ll cover two simple ways to extract Exif (Exchangeable image file) data from images. In short, Exif is information about a digital picture, such as:
– Date and time the picture was taken
– Type of camera used
– Types of settings on the camera
– GPS Coordinates where picture was taken
- At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
- 5 Reasons to Hire a Fractional CISO
- Why Private Cybersecurity Training Matters for Your Organization
- 70% of Cyber Attacks Will Be Against Small Businesses in 2020
- Is the CEH Certification Right For You?
- Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
- Best Beginner Cybersecurity Certification to Get
- Over-complicating Risk in Cybersecurity
- Ransomware – Should You Pay?
- Hacking Medical Devices for Profit, Terror, Assassination, and Enemy Advancement
Questions about Alpine Security?