Forensics

Malware Research Explained, Part 1

Many organizations hear the term “malware” and immediately screech in fear. If you are interested in malware research, as long as you are using safe practices, there is not a lot to be afraid of. For those of you who are interested in malware research and figuring out how and why these pieces of malicious software do what they do, this article might be for you.

3 Steps to Hide Data in an Image Using Steganography

Steganography is used by hackers to hide overtly hide data. Hiding data overtly does not raise suspicion, because no one knows there is something hidden. A common example of steganography is hiding an image inside another image. Watermarking can also be considered steganography, if the watermark is not visible.

2 Simple Ways to Extract GPS Coordinates from Pictures

In this post, we'll cover two simple ways to extract Exif (Exchangeable image file) data from images. In short, Exif is information about a digital picture, such as:
- Date and time the picture was taken
- Type of camera used
- Types of settings on the camera
- GPS Coordinates where picture was taken
- Etc.