A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Michael Raggo: Data Hiding and Steganography SkyDogCon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Michael Raggo: Data Hiding and Steganography
SkyDogCon 2013

If the newswire is any indication, corporate espionage, covert communications, and evidence concealment continue to plague corporations, investigators, and the military. Use of data hiding techniques by Russian Spies for covert communications, Operation Shady RAT and Alureon corporate espionage trojans, and German evidence of steganography used by Al Qaeda, are the latest in a series of incidents involving data hiding.

This presentation will highlight some of the latest research of the 21st century involving data hiding techniques over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding data on mobile devices, operating systems, VOIP, virtual images, social networks, and other dominating technologies in today's world.

Having demonstrated the latest data hiding techniques, detailed analytical methods for discovering hidden data, as well as jamming methods for disrupting data hiding operations will be outlined. We will then consider emerging technologies and attack methods, including cloud considerations, parallel processing attack methods, privacy protection, and derivative data hiding and detection theories.

About the Speaker

Michael T. Raggo (CISSP, NSA-IAM, CCSI, ACE, CSI), Security Evangelist, MobileIron, Inc. applies over 20 years of security technology experience and evangelism to the technical delivery of Mobile Security Solutions. Mr. Raggo’s technology experience includes mobile device security, penetration testing, wireless security assessments, compliance assessments, incident response and forensics, security research, and is a former security trainer. In addition, Mr. Raggo conducts ongoing independent research on various Data Hiding techniques including steganography, as well as Wireless and Mobile Device attack and countermeasure techniques. His publications include books for Syngress titled “Data Hiding” and McGraw Hill as a contributing author for “Information Security the Complete Reference 2nd Edition”, as well as multiple magazine and online articles.

Mr. Raggo has presented on various security topics at numerous conferences around the world (BlackHat, DefCon, SANS, DoD Cyber Crime, OWASP, InfoSec, etc.) and has even briefed the Pentagon.

 


Back to SkyDogCon 3 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast