Steganography Combo: StegHide and Twitter

The security site "DarkReading" had a couple of interesting articles on the use of steganography in malware: http://www.darkreading.com/endpoint/attack-uses-image-steganography-for-stealthy-malware-ops-on-instagram/d/d-id/1327170 http://www.darkreading.com/endpoint/new-malware-found-hiding-inside-image-files/d/d-id/1320895 The idea of an stealthy malware command and control center is very intriguing. As some researchers point out in the above articles, an ideal malware command and control center can deliver instructions to malware bots around … Continue reading Steganography Combo: StegHide and Twitter

Elasticsearch & Java: Tips for faster re-indexing

Notes based on some feedback: Elasticsearch seem to be pushing the REST client rather than using the native Java client... to future proof your code you may be better off going down this route. Why not just use the Re-Index API? Although it's still considered experimental, this may be a good option if you dont have … Continue reading Elasticsearch & Java: Tips for faster re-indexing