Over the past week we have been hearing how data from Facebook was used to potentially swing voters in the US elections and other campaigns by a firm called #CambridgeAnalytica.

What is Cambridge Analytica?

It is a British company which uses social media data to help clients influence voters or consumers by targeting messages based on people's hopes and fears.


How can data from Facebook potentially help in a political campaign?

Well, to start with, based on your interactions with Facebook over time, the platform has enough data about your likes and dislikes. It knows the kind of people you follow, the types of news sources you read and the range of actions and reactions these posts elicit from you. All these data points in combination are good enough to know your political affiliation, or a lack of such inclination.

How is this data used?

While none of us really use this, there is a Facebook ad preferences page that tells you how the social network sees you in reference to serving ads. It is not a perfect science at all, but based on your likes and dislikes Facebook lists the topics, people and interests which it thinks are good enough to push ads to you.

Emerging from several days in hiding while the Cambridge Analytica storm swamped his company, Facebook founder and CEO Mark Zuckerberg finally spoke on Thursday. “We have a responsibility to protect your data, and if we can’t then we don’t deserve to serve you,” his post sets out. #isoeh #Facebook #DataSecurity #MarkZuckerberg

See More
No automatic alt text available.

StaCoAn is a crossplatform tool which aids developers, bug-bounty hunters and ethical hackers performing static code analysis on mobile applications*.

The concept is that you drag and drop your mobile application file (an .apk or .ipa file) on the StaCoAn application and it will generate a visual and portable report for you. You can tweak the settings and wordlists to get a customized experience.
The reports contain a handy tree viewer so you can easily browse trough your dec...ompiled application.

This tool will look for interesting lines in the code which can contain:
Hardcoded credentials
API keys
URL's of API's
Decryption keys
Major coding mistakes
#isoeh #HackingTool #EthicalHacking #BugBounty

See More
52 Reviews
Tell people what you think
Kunal Pandey
· August 10, 2017
Well,if you want to level up from noobie level to expert level,this is the perfect place to start.
Always cherish my memories while I learned python and CEH from isoeh.
All time favourite Sanchay Sir ...taught me some advance hacking skills and python course.
If anyone want to learn hacking,networking and coding,join ISOEH.
Remember "one door can unlock many opportunities."
See More
Sherlin Oneeta Bastin
· January 31, 2018
I recently did my EC Council ECSA v9 certification via ISOEH and it was a good experience. I cleared the exam successfully. I wish to recommend ISOEH for their prompt and professional services. You ar...e doing a good job, guys! See More
Karn Patil PK
· March 12, 2018
It was great visit at Kolkata. I really want to go. I am a hacker and i proud to be a hacker.
Sayani Banerjee
· September 6, 2017
Training is provided by the top notch industry professionals here. Trust the best in the industry.
Gourav Sureka
· April 21, 2016
I did a workshop on Digital marketing and found it to be very interesting. It changes the point of view we look at social networking, website and everything online. I hope this will help create a effe...ctive digital market for my company. See More
Ranadip Sarcer
· March 12, 2016
Today I participated a workshop on Ethical Hacking, Reverse Engineering & Python Programming which was arranged by Indian Institute of Ethical Hacking held at SDF Building Today I learned from Mr. Sa...ndeep Sengupta who was presented this workshop & told us what is ethical hacking & where we implement it, how to secure a database from viruses and also know little bit of Reverse Engineering & Python Programming. Lastly, I am saying this was a nice experience for me. #Workshop #Great #Experience #ISOEH See More
Vatsal Agrawal
· July 9, 2017
One of the best faculties in town for learning programming basics - advanced levels of hacking.
Santosh Subramanian
· August 26, 2016
Attended the Digital Marketing Workshop Conducted by ISOEH and the Speaker was Sandeep Sengupta Sir ,
Well i must Admit , it was a Great Experience , Got to know many Newer things as well as known th...ings in a different perspective ..
So I would urge ISOEH Team and Sandeep sir to continue making these kind of workshops in future as well ..
Regards Santosh
See More
Alisha Roy
· August 7, 2017
One stop solution to learn all about Ethical Hacking under expert professionals.
Néèrâj Kûmâr Jhâ
· January 9, 2017
I have attend the seminar on ethical hacking in behala college.speech was delivered by the expert of this was a special topic.loved it.
Ronny Raymonds
· June 15, 2017
After Chinese techbies, India is growing next best hacker here.
Aman Kant Jaikar
· June 27, 2017
I am very interested in ethical hacking i joning
The isoeh ....
Puja Dey
· June 29, 2017
Tall Takers are present in this company. Only concerned to fool people. Bad Bad
Sixth Sense - Innovation Unlimited
Why everybody should learn programming
Watch this Russian hacker break into our computer within minutes

Get exclusive hands-on training on #EthicalHacking. Book your seats now.
Lunch will be provided.
Certificate will be given to each participant.

Sun 11:00 AM UTC+05:30Indian School of Ethical HackingKolkata, India
249 people interested

Smart home devices are easy to hack. How to protect yourself?

The latest bad news about smart home devices is that they're easy to hack, according to a team of researchers who did just that to prove these gadgets have serious security issues.
Off-the-shelf devices that include baby monitors, home security cameras, doorbells, and thermostats were easily co-opted by cyber researchers at Ben-Gurion University of the Negev (BGU).


Many products come with common, easy-to-guess default passwords, which consumers then don't change, making it easy for hackers to break in. Cybercriminals can also gain access to entire wifi networks just by retrieving the password stored on one device.
Tips for IoT Product Security:

With the goal of making consumers smarter about smart home device protection, BGU researchers offer a number of tips to keep IoT devices, families and businesses more secure:

1. Buy IoT devices only from reputable manufacturers and vendors.
2. Avoid used IoT devices. They could already have malware installed.
3. Research each device online to determine if it has a default password and if so change before installing.
4. Use strong passwords with a minimum of 16 letters. These are hard to crack.
5. Multiple devices shouldn't share the same passwords.
6. Update software regularly which you will only get from reputable manufacturers.
7. Carefully consider the benefits and risks of connecting a device to the internet. #isoeh #SmartHomeDevices #HackAlert

See More
Image may contain: one or more people, phone and indoor

RottenSys, pre-installed malware infected 5 Million Android Phones

Security researchers at CheckPoint have discovered that Chinese Cyber Criminals are using a malware named as RottenSys to attack android phones all over the world; almost 5 million android devices in their botnet network.

Dubbed RottenSys, the malware that disguised as a 'System Wi-Fi service' app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung... and GIONEE—added somewhere along the supply chain.

To evade detection, the fake System Wi-Fi service app comes initially with no malicious component and doesn’t immediately start any malicious activity. Instead, RottenSys has been designed to communicate with its command-and-control servers to get the list of required components, which contain the actual malicious code. #isoeh #AndroidMalware #RottenSys #SecurityAlert

See More
Image may contain: text

#ISOEH director Sandeep Sengupta representing Nasscom East at Workshop - Cyber Safe Bengal, organized by Cyber Security Center of Excellence, Department of It & Electronics, Govt. of West Bengal.

Image may contain: 3 people

Over 1,700 cases of fraud related to credit/debit card and net banking, losses touching Rs 71.48 crore in 2017

A total of 1,785 cases related to credit/debit card and Internet banking for amounts involving Rs 1 lakh and more were reported last year, Minister of State for Electronics and IT K J Alphons said in a written reply to Rajya Sabha.

He added that the extent of losses in these cases totalled Rs 71.48 crore....
As per information received from RBI, 30,222 incidents of phishing/vishing, OTP compromise, fraud by compromise of user credentials, compromise of mobile phone numbers of customers were reported in October-December 2017. #isoeh #BankingFraud #HackAlert #SecurityNews

See More
Banks and payment system operators have been advised to enhance the security and risk mitigation measures for card transactions.

Ensure web security with Acunetix Vulnerability Scanner

This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.

Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the fa...lse positive rate. #isoeh #HackingTool #WebSecurity
Download link below!

See More
Acunetix Vulnerability Scanner ensures web application security by securing your website and web applications against hacker attacks

What if a smart camera started watching you, instead of watching your home?

Multiple security vulnerabilities discovered by Kaspersky lab researchers in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance.

According to the research, the uncovered flaws could allow attackers to obtain remote access to video and audio feeds from the cameras, remotely disable these devices, execute arbitrary malicious code on the...m and do many other things.

However, in their latest research, #Kaspersky Lab experts uncovered something extraordinary: not just one, but a whole range of smart cameras was found to be vulnerable to a number of severe remote attacks. #Isoeh #SpyCamera #CyberSecurity #SecurityAlert

See More
What if a smart camera started watching you, instead of watching your home?

Demand for professionals in #CyberSecurity field has increased by three times in the past one year.

As companies try to enhance their defense systems against information security breaches, the demand for people who have got an expertise in the field of cyber-security has outstripped the past figures. he reason for it is quite evident and self-explaining. This has all been explained and elaborated in a report conducted by Belong.

The report states that the organizations are on a hiring spree in order to secure their information and credentials from getting breached.
Admissions going on! #isoeh #ITSecurity #NetworkSecurity #EthicalHacking
Know more:

See More
Image may contain: one or more people, people sitting and table

IoT holds great potential but it also brings security concerns in healthcare.

All the devices involved in treatment — microscopes, refrigerators storing chemicals, pharmacy-compounding equipment, infusion pumps and smart beds — are connected to the hospital’s network in a complex synthesis of information not possible a decade ago. The data shared between these devices traverse the same network, so that the treatment team can have a shared vision of events.

Aside from, IoT devices are also used to collect data, monitor systems and control the fabric that holds together the inner workings of many industries. Hospital pharmacies require the same level of controls as refineries, power generation facilities, and even lights-out warehouses — where sensors precisely assess processes and make adjustments in near real-time. #IoT #CyberSecurityNews #DataSecurity #Healthcare #isoeh

See More
In today’s world, the Internet of Things (IoT) is ubiquitous and holds great potential, but also brings security concerns. While IoT devices are being used across industries, the healthcare industry’s experiences with insecure devices provide valuable lessons to heed.

Fortnite Accounts Getting Hacked.
Here's how you can protect your Fortnite account from being hacked:

In recent weeks, many Fortnite players have posted on places like Reddit and the Epic Games forums to complain about their accounts getting compromised. Here are few suggestions to avoid that:
1. Using the same password across multiple sites is a bad idea....
2. Fraudulent offers can fool unwitting players.
3. Change all your passwords right away if you see fraudulent charges on your account
4. Make sure your computer and phone are up to date. Turn on auto-updates.
5. Sign up for two-step verification/two-factor sign-in.
6. Install an anti-virus and keep it up-to-date as well, even if you're on a Mac or iOS where viruses are much less common.
#isoeh #FortniteHack #HackAlert #HackingNews

See More
Here's how you can protect your Fortnite account from being hacked and racking up hundreds of dollars in fraudulent charges.

Drop your CV at!

No automatic alt text available.
ISOAH Data Securities Pvt. Ltd.

We are hiring!

We are looking for an auditor or consultant with a pragmatic approach to ISO 27001 and ISO 9001 Quality Audit.

Desired Candidate Profile...
- Certifications such as ISO/IEC 27001, ISO 9001 etc.
- Proficient with MS Office (word, excel, power point)
- Good communication skills written and verbal
- Must be proficient in writing policies

Salary:INR 2,25,000 - 6,00,000 P.A.

Interested candidates may drop CV at or Whatsapp at 9830310550
For more info:

See More

Slingshot, a hacking campaign targets routers to plant spyware in target machines across the Middle East and Africa.

Routers are always an attractive target for hackers. They're always on and connected, often full of unpatched security vulnerabilities, and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet.

A newly discovered nation-state cyber espionage campaign targeting Africa and the Middle East infects network routers in order to... snare administrative credentials from its targets and then move freely throughout the network.

Infecting a router at a business or coffee shop, for instance, would then potentially give access to a broad range of users. #isoeh #RouterHacking #Slingshot #HackingCampaign #HackAlert

See More
No automatic alt text available.