Maxim Weinstein

Technologist & Educator

Menu

Skip to content
  • Home
  • About
  • In the News
  • Public Speaking
  • Elsewhere

Web exploits meet steganography

Posted on July 18, 2013 by Maxim Weinstein

Interesting catch by Sucuri, a website exploit that adds malicious code to the EXIF headers in legitimate images on the compromised host.

Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)

Like this:

Like Loading...

Related

This entry was posted in Security. Bookmark the permalink.

Post navigation

← Be careful what you wish for
How much is too much? →

Archives

  • June 2022 (1)
  • April 2022 (1)
  • February 2022 (2)
  • December 2021 (1)
  • January 2017 (2)
  • June 2014 (1)
  • May 2014 (1)
  • July 2013 (3)
  • May 2013 (1)
  • March 2013 (2)
  • February 2013 (1)
  • January 2013 (3)
  • December 2012 (1)
  • November 2012 (3)
  • July 2012 (1)
  • February 2012 (2)
  • December 2011 (1)
  • September 2011 (1)
  • July 2011 (1)
  • June 2011 (3)
  • May 2011 (2)
  • April 2011 (2)

Twitter

  • RT @IanColdwater: The Minneapolis Public Schools data breach is really bad. Much worse than we've been told. This affects current & former… 2 weeks ago
  • @ElCalavero @Twitter @MarechalPhD twitter.com/maximweinstein… 4 months ago

Links

  • Schneier on Security
  • Sophos
  • Sophos Security Insights (my column on Dark Reading)
  • StopBadware
  • The Dessert Blog
Blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Maxim Weinstein
    • Already have a WordPress.com account? Log in now.
    • Maxim Weinstein
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: