Can you be hacked through a picture? Image Steganography

Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →

An overview of Conti and the Ransomware-as-a-Service (RaaS) industry

During the past two years, it seems that Conti, a Russian-based cybercriminal organization, has been imposed as one of the most profitable in the entire Ransomware-as-a-Service (RaaS) ecosystem. Chainalysis estimates that the cyber gang grossed the largest profits in 2021 in the RaaS industry: $180 million extorted. In Europe alone, according to cyber criminals' online... Continue Reading →


The whole world is currently following closely what is happening in Ukraine since February 24th, which is most understandable given the seriousness of the events. Together with the military actions, several specialists and newspapers raised the implication of cyberspace in the war being waged. Contrary to what this growing interest in the cyber contribution seems... Continue Reading →

Spoofing Explained

How I Met Your Mother Have you ever watched the episode entitled “The Playbook” (05x08) of How I met your Mother? If you haven’t, you are missing twenty-four minutes of entertainment. And if you have, well, you do have a concrete representation of what spoofing looks like. Spoofing is the action of pretending to be... Continue Reading →

Create a website or blog at

Up ↑