Skip to content
Contact Us
FAQ
Log in to Light Point Web
Light Point Web
Use Cases
Company
About Us
Contact Us
Press Room
Blog
Resources
How to Overcome the Pitfalls of Using Tor
Read More
How to Balance Employee Freedom With the Needs of Corporate Security
Read More
How to Prevent Web Browser Forensic Data From Falling Into the Wrong Hands
Read More
Securing Your WordPress Site: Top Plugins
Read More
Facebook Supports HTTPS Secure Connection
Read More
Guide to Removing Malicious Apps From Your Facebook Account
Read More
How to Remove Third Party Apps From Your Twitter Account
Read More
FEATURED POSTS
Newly Discovered Chrome Vulnerability Could Lead to Full System Compromise with No User Interaction
How to Balance Employee Freedom With the Needs of Corporate Security
Light Point Security CEO Invited to Speak at the Pentagon
EMAIL UPDATES
Follow @LightPointSec
Light Point Security
@LightPointSec
New Malvertising Campaign Uses Steganography to Bypass Detection
hubs.ly/H0gzXJf0
#InfoSec
#cybersecurity
…
twitter.com/i/web/status/1…
about 5 hours ago
This latest
#malvertising
campaign fools ad networks into displaying malicious ads by using
#steganography
to bypas…
twitter.com/i/web/status/1…
about 4 days ago
Have you heard of steganography? This new
#malvertising
campaign uses
#steganography
to bypass detection and fool a…
twitter.com/i/web/status/1…
about 5 days ago
Survey shows extent of web browser–based cyber threats
hubs.ly/H0gqkC00
via
@TechnicallyBMR
by…
twitter.com/i/web/status/1…
about 2 weeks ago
RT
@tammithomas
:
@LightPointSec
(a
@MDTEDCO
portfolio company) commissioned research shows extent of web browser-based cyber threats... htt…
about 2 weeks ago
Recent Blog Posts
New Malvertising Campaign Uses Steganography to Bypass Detection
February 12, 2019
Microsoft Releases Emergency Patch for Internet Explorer to Address Critical Vulnerability
December 21, 2018
How to Overcome the Pitfalls of Using Tor
December 18, 2018
Newly Discovered Chrome Vulnerability Could Lead to Full System Compromise with No User Interaction
December 17, 2018
Categories
Categories
Select Category
Blurb (5)
Business of Software (9)
Case Study (2)
Computer Security (27)
Events (39)
Featured (3)
Fun Friday (3)
How To (7)
Light Point Security Update (47)
Light Point Web (23)
Opinion (7)
Press Release (11)
Programming (1)
Resources (6)
Security (55)
Startups (28)
Uncategorized (1)
Web Security (48)
Tags
Select Tag
Adii Pienaar
Amy Hoy
and Bill Bither
Anonymous Web Browsing
antivirus
Apple
application security
Apps
Apps for Security
authentication
awards
Balsamiq
Baltimore
Baltimore Business Journal
Baltimore County
Beau Adkins
BizSpark
Black Hat
Black Hat 2012
Black Hat after parties
Black Hat USA
Blackhole
Boost Fund
booth babes
bootstrapping
BoS2010
BoS2011
BoS2012
Browser isolation
Browser Security
brute force attack
Business of Software
business quotes
bwtech@UMBC
campaigning
case study
CCH
Chargify
Children's National Medical Center
Citibank
Clayton Christensen
cloud computing
color.com
communication
Computer Security
Conference
Content Disarm and Reconstruction
Contest
Cool Exploit Kit
Corporations
Cryptography
culture
Customer Acquisition
Customer Happiness Index
Customer Retention
CVE-2018-8653
Cyber
Cyber Crime
CyberMaryland
CyberMaryland 2013
CyberMaryland 2015
CyberMaryland 2016
CyberMaryland Conference
cybersecurity
Cybersecurity 500
cybersecurity companies
cybersecurity insurance
Cybersecurity Ventures
Dan Martell
Data sanitization
Dave Collins
David Cancel
Day of Fosterly
Dharmesh Shah
Do Not Track
DoD
DoF2013
Dropbox
eBook
education
ELEVI
Email Marketing
Email Scams
Employees
encryption
Entrepreneur Expo
Entrepreneur Spotlight
entrepreneurs
entrepreneurship
Epsilon
events
Facebook
Facebook Highlight
Facebook scams
Facebook Security
FBI
female leaders
File sanitization
Firefox
FOSE
Founders
fraud
Free
Free eBook
Free Resources
Fresh Outlook
Full Isolation
Fun Friday
funding
Google Chrome
Google Docs Viewer
government
government IT
hackathon
Hacker Challenge
hackers
hard work
Healthcare
healthcare providers
healthcare records
Hiten Shah
Hollywood IT Summit
Hotmail
How To
Howard Tech Council
HTC
HTC Tech Awards
HTML5
https
Ian Duncan
ICOY
Infographic
Information Assurance
Information Security
Infosec
innovation
Innovation Sandbox
insider threats
Internet Explorer
Internet Security
InvestMaryland Challenge
investors
Iowa caucus
IRS
isolation-based security
Jason Cohen
Jeff Lawson
Joel Spolsky
Johns Hopkins University
Josh Linkner
Kathy Sierra
Laura Fitton
Leadership
lessons learned
LifeBridge Health
Light Point Security
Light Point Web
Light Point Web Enterprise
malicious ads
malicious emails
malicious links
malvertising
malware
Managed Service Providers
Marketing
Maryland
MAVA
MESA HITS
metascan
MicroConf 2012
microsoft
Mike Taber
Minimally Viable Product
Minorities
minority owned startups
Mozilla
MSN
MSP
National Cyber Security Awareness Month
National Security Agency
Neil Davidson
Network Security
Northern Virginia Technology Council
Northrop Grumman
Norton Safe Web
NSA
NVTC
Online Scams
opswat
outsider threats
partners
passion
passwords
Patrick McKenzie
PDF
Peldi
phishing
phishing emails
phishing scams
pitch
Privacy
Product Development
quotes
Ransomware
Raven Data Technologies
RCE
Remote Browser Isolation
Rick Santorum
Rob Walling
router
RSA
RSA Conference
RSA Conference 2013
RSAC
Ryan McDonald
San Bernardino
SANS
Sarah Hatter
SecurID
security
Security Alerts
security breach
security breaches
Security Competitions
Security Conference
Security Events
Security Fail
security mistakes
security patch
security risk
Security Training
security trends
security vulnerability
Seth Godin
SINET
Small Business
Smarketing
Social Media
Software
spam
spear phishing
Spreedly
SQLite
Startup Fears
Startup of the Year
startup quotes
Startups
statistics
Status Update
steganography
Steve Wozniak
Stuxnet
subversion
success
System Engineering
Tailored Suggestions
tax scam
Taxes
Tech Faceplant
TechBreakfast
TechBUZZ
TechBUZZ Spring 2013
Technical.ly Baltimore
Technically Baltimore
Techno Security & Digital Forensics Conference
TEDCO
terrorism
The Baltimore Sun
The Daily Record
The Pentagon
Third Party Apps
to the cloud
Trac
Tracking
Tribes
Twitter
Twitter hacks
Twitter privacy
Twitter security
University of Maryland Medical System
Venture Capital
Verizon
version control
verymal
video
Wall Street Journal
WannaCry
web browsers
Web Security
webinar
Webinars
Website Sales
Windows Live
women in tech
Women of the World
WooThemes
WordPress
WOW
WSJ Startup of the Year
WSJSOTY
Zeus
Zuly Gonzalez
FOLLOW US ON