logo
  • IEEE.org
  • IEEE Computer Society
  • Search
  • About
    • Editorial Board
    • Staff
  • History
  • Back Issues
  • Write for Us
    • Calls for Papers
    • Special Issue Proposal Guidelines
    • Submit a Manuscript
  • Subscribe
  • Join
Computer Magazine  logo
  • About
    • Editorial Board
    • Staff
  • History
  • Back Issues
  • Write for Us
    • Calls for Papers
    • Special Issue Proposal Guidelines
    • Submit a Manuscript
  • Subscribe
  • Join
  • site logo

hacking

steganography

With Cryptography Easier to Detect, Cybercriminals Now Hide Malware in Plain Sight. Call It Steganography. Here’s How It Works.

November 15, 2018
Cybercriminals now tunnel their malicious data to your devices in a different way. It's called "steganography"—and it involves hiding a document, video, or phot... Read More »
Uncategorized7 min read

Recent Posts

  • A Note About Late Issues
  • 2018 Reviewer Thanks
  • Digital Health: Active and Healthy Living [CFP]
  • Meet Mark Harman: professor, co-founder of search-based software engineering, Facebook’s Sapienz manager, and now Computer Society award winner. He’s ‘a virtuous cycle of innovation, deployment, and further scientific discovery’
  • China Global Television Network interviews IEEE Computer Society leader about our Top 10 Tech Trends for 2019

Archives

  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016

computer society logo in white

ieee logo in white

  • Privacy
  • Security
  • Advertising
  • Site Map
  • Contact
  • Press Room
This site and all contents (unless otherwise noted) are © 2018, IEEE. All rights reserved.