| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Michael Raggo: Data Hiding and Steganography If the newswire is any indication, corporate espionage,
covert communications, and evidence concealment continue to plague corporations,
investigators, and the military. Use of data hiding techniques by Russian Spies
for covert communications, Operation Shady RAT and Alureon corporate espionage
trojans, and German evidence of steganography used by Al Qaeda, are the latest
in a series of incidents involving data hiding. This presentation will highlight some of the latest research
of the 21st century involving data hiding techniques over the network and with
data-at-rest. The highlights will demonstrate new techniques for hiding data on
mobile devices, operating systems, VOIP, virtual images, social networks, and
other dominating technologies in today's world. Having demonstrated the latest data hiding techniques,
detailed analytical methods for discovering hidden data, as well as jamming
methods for disrupting data hiding operations will be outlined. We will then
consider emerging technologies and attack methods, including cloud
considerations, parallel processing attack methods, privacy protection, and
derivative data hiding and detection theories. Michael T. Raggo (CISSP, NSA-IAM, CCSI, ACE, CSI), Security
Evangelist, MobileIron, Inc. applies over 20 years of security technology
experience and evangelism to the technical delivery of Mobile Security
Solutions. Mr. Raggo’s technology experience includes mobile device security,
penetration testing, wireless security assessments, compliance assessments,
incident response and forensics, security research, and is a former security
trainer. In addition, Mr. Raggo conducts ongoing independent research on various
Data Hiding techniques including steganography, as well as Wireless and Mobile
Device attack and countermeasure techniques. His publications include books for
Syngress titled “Data Hiding” and McGraw Hill as a contributing author for
“Information Security the Complete Reference 2nd Edition”, as well as multiple
magazine and online articles. Mr. Raggo has presented on various security topics at
numerous conferences around the world (BlackHat, DefCon, SANS, DoD Cyber Crime,
OWASP, InfoSec, etc.) and has even briefed the Pentagon.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast