Over the past week we have been hearing how data from Facebook was used to potentially swing voters in the US elections and other campaigns by a firm called #CambridgeAnalytica.
What is Cambridge Analytica?
It is a British company which uses social media data to help clients influence voters or consumers by targeting messages based on people's hopes and fears....
How can data from Facebook potentially help in a political campaign?
Well, to start with, based on your interactions with Facebook over time, the platform has enough data about your likes and dislikes. It knows the kind of people you follow, the types of news sources you read and the range of actions and reactions these posts elicit from you. All these data points in combination are good enough to know your political affiliation, or a lack of such inclination.
How is this data used?
While none of us really use this, there is a Facebook ad preferences page that tells you how the social network sees you in reference to serving ads. It is not a perfect science at all, but based on your likes and dislikes Facebook lists the topics, people and interests which it thinks are good enough to push ads to you.
Emerging from several days in hiding while the Cambridge Analytica storm swamped his company, Facebook founder and CEO Mark Zuckerberg finally spoke on Thursday. “We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” his post sets out. #isoeh #Facebook #DataSecurity #MarkZuckerberg
StaCoAn is a crossplatform tool which aids developers, bug-bounty hunters and ethical hackers performing static code analysis on mobile applications*.
The concept is that you drag and drop your mobile application file (an .apk or .ipa file) on the StaCoAn application and it will generate a visual and portable report for you. You can tweak the settings and wordlists to get a customized experience.
The reports contain a handy tree viewer so you can easily browse trough your dec...ompiled application.
This tool will look for interesting lines in the code which can contain:
URL's of API's
Major coding mistakes
#isoeh #HackingTool #EthicalHacking #BugBounty
Always cherish my memories while I learned python and CEH from isoeh.
All time favourite Sanchay Sir ...taught me some advance hacking skills and python course.
If anyone want to learn hacking,ne
Remember "one door can unlock many opportunit
Well i must Admit , it was a Great Experience
So I would urge ISOEH Team and Sandeep sir to continue making these kind of workshops in future as well ..
The isoeh ....
Get exclusive hands-on training on #EthicalHacking. Book your seats now.
Lunch will be provided.
Certificate will be given to each participant.
Smart home devices are easy to hack. How to protect yourself?
The latest bad news about smart home devices is that they're easy to hack, according to a team of researchers who did just that to prove these gadgets have serious security issues.
Off-the-shelf devices that include baby monitors, home security cameras, doorbells, and thermostats were easily co-opted by cyber researchers at Ben-Gurion University of the Negev (BGU).
Many products come with common, easy-to-guess default passwords, which consumers then don't change, making it easy for hackers to break in. Cybercriminals can also gain access to entire wifi networks just by retrieving the password stored on one device.
Tips for IoT Product Security:
With the goal of making consumers smarter about smart home device protection, BGU researchers offer a number of tips to keep IoT devices, families and businesses more secure:
1. Buy IoT devices only from reputable manufacturers and vendors.
2. Avoid used IoT devices. They could already have malware installed.
3. Research each device online to determine if it has a default password and if so change before installing.
4. Use strong passwords with a minimum of 16 letters. These are hard to crack.
5. Multiple devices shouldn't share the same passwords.
6. Update software regularly which you will only get from reputable manufacturers.
7. Carefully consider the benefits and risks of connecting a device to the internet. #isoeh #SmartHomeDevices #HackAlert
RottenSys, pre-installed malware infected 5 Million Android Phones
Security researchers at CheckPoint have discovered that Chinese Cyber Criminals are using a malware named as RottenSys to attack android phones all over the world; almost 5 million android devices in their botnet network.
Dubbed RottenSys, the malware that disguised as a 'System Wi-Fi service' app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung... and GIONEE—added somewhere along the supply chain.
To evade detection, the fake System Wi-Fi service app comes initially with no malicious component and doesn’t immediately start any malicious activity. Instead, RottenSys has been designed to communicate with its command-and-control servers to get the list of required components, which contain the actual malicious code. #isoeh #AndroidMalware #RottenSys #SecurityAlert
Over 1,700 cases of fraud related to credit/debit card and net banking, losses touching Rs 71.48 crore in 2017
A total of 1,785 cases related to credit/debit card and Internet banking for amounts involving Rs 1 lakh and more were reported last year, Minister of State for Electronics and IT K J Alphons said in a written reply to Rajya Sabha.
He added that the extent of losses in these cases totalled Rs 71.48 crore....
As per information received from RBI, 30,222 incidents of phishing/vishing, OTP compromise, fraud by compromise of user credentials, compromise of mobile phone numbers of customers were reported in October-December 2017. #isoeh #BankingFraud #HackAlert #SecurityNews
Ensure web security with Acunetix Vulnerability Scanner
This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the fa...lse positive rate. #isoeh #HackingTool #WebSecurity
Download link below!
What if a smart camera started watching you, instead of watching your home?
Multiple security vulnerabilities discovered by Kaspersky lab researchers in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance.
According to the research, the uncovered flaws could allow attackers to obtain remote access to video and audio feeds from the cameras, remotely disable these devices, execute arbitrary malicious code on the...m and do many other things.
However, in their latest research, #Kaspersky Lab experts uncovered something extraordinary: not just one, but a whole range of smart cameras was found to be vulnerable to a number of severe remote attacks. #Isoeh #SpyCamera #CyberSecurity #SecurityAlert
Demand for professionals in #CyberSecurity field has increased by three times in the past one year.
As companies try to enhance their defense systems against information security breaches, the demand for people who have got an expertise in the field of cyber-security has outstripped the past figures. he reason for it is quite evident and self-explaining. This has all been explained and elaborated in a report conducted by Belong.
The report states that the organizations are go...ing on a hiring spree in order to secure their information and credentials from getting breached.
Admissions going on! #isoeh #ITSecurity #NetworkSecurity #EthicalHacking
Know more: https://www.isoeh.com/ceh.html
IoT holds great potential but it also brings security concerns in healthcare.
All the devices involved in treatment — microscopes, refrigerators storing chemicals, pharmacy-compounding equipment, infusion pumps and smart beds — are connected to the hospital’s network in a complex synthesis of information not possible a decade ago. The data shared between these devices traverse the same network, so that the treatment team can have a shared vision of events.
Aside from healthca...re, IoT devices are also used to collect data, monitor systems and control the fabric that holds together the inner workings of many industries. Hospital pharmacies require the same level of controls as refineries, power generation facilities, and even lights-out warehouses — where sensors precisely assess processes and make adjustments in near real-time. #IoT #CyberSecurityNews #DataSecurity #Healthcare #isoeh
Fortnite Accounts Getting Hacked.
Here's how you can protect your Fortnite account from being hacked:
In recent weeks, many Fortnite players have posted on places like Reddit and the Epic Games forums to complain about their accounts getting compromised. Here are few suggestions to avoid that:
1. Using the same password across multiple sites is a bad idea....
2. Fraudulent offers can fool unwitting players.
3. Change all your passwords right away if you see fraudulent charges on your account
4. Make sure your computer and phone are up to date. Turn on auto-updates.
5. Sign up for two-step verification/two-factor sign-in.
6. Install an anti-virus and keep it up-to-date as well, even if you're on a Mac or iOS where viruses are much less common.
#isoeh #FortniteHack #HackAlert #HackingNews
Drop your CV at firstname.lastname@example.org!
We are hiring!
We are looking for an auditor or consultant with a pragmatic approach to ISO 27001 and ISO 9001 Quality Audit.
Desired Candidate Profile...
- Certifications such as ISO/IEC 27001, ISO 9001 etc.
- Proficient with MS Office (word, excel, power point)
- Good communication skills written and verbal
- Must be proficient in writing policies
Salary:INR 2,25,000 - 6,00,000 P.A.
Interested candidates may drop CV at email@example.com or Whatsapp at 9830310550
For more info: http://bit.ly/2IiPn6M
Slingshot, a hacking campaign targets routers to plant spyware in target machines across the Middle East and Africa.
Routers are always an attractive target for hackers. They're always on and connected, often full of unpatched security vulnerabilities, and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet.
A newly discovered nation-state cyber espionage campaign targeting Africa and the Middle East infects network routers in order to... snare administrative credentials from its targets and then move freely throughout the network.