It has taken some time but we finally have succumbed to the delights of a certain kitchen utensil. Years of resisting George, John, and the seductive talents of Penelope, had left me more determined than ever to resist at all Continue reading Protect Your Business From State-Sponsored Attacks
Muema Lombe explores the area of IT audit and the questions that should be asked in an incident response scenario. Continue reading IT Audit & Digital Forensics: How to use an IT audit to prepare for a computer forensics investigation.
A new zero-day exploit in Microsoft Windows was disclosed today. The exploit allows an application to elevate privilege to “system,” and in Vista and Windows 7 also bypass User Account Control (UAC). The flaw was posted briefly on a programming Continue reading New Windows zero-day flaw bypasses UAC
Norwegian Scientists have devised a way to ‘blind’ quantum cryptography photon sensors using lasers Continue reading Scientists ‘hack’ quantum cryptography
In classifying digital watermarking programs as digital steganography applications, it is important to distinguish between watermarking programs that embed a visible watermark and those that embed an invisible watermark. Because the objective of steganography is to conceal the existence of information, a watermarking program that embeds a visible watermark in the carrier file could hardly be considered a steganography application. Continue reading Digital Watermarking—A Specialized Form of Digital Steganography