video log on YouTube is also based on a similar concept where he has demonstrated some of the situations mentioned in the book.
Ankit Fadia says insists his new book is for a 'curious' layman and differs from his earlier books that focused on technical aspects and dealt more with hacking issues.
The Delhi boy who previously shuttled between the US and India is presently based in Mumbai.
He has signed a three-book deal with Penguin and plans to come up next with a fun-filled fiction novel.
"There will be hacking involved in this story about three friends besides a love story angle. There might be incidents inspired from real-life but it is definitely not about me", he says, "I always wanted to write down a fiction novel".
Fadia, who became the youngest author published by Macmillan at the age of 14, also runs certificate courses through video conferencing.
However, the 'ethical hacker' has over the time been idolised by geeks but dismissed by critics who have time and again questioned his credibility as an expert. To this, Fadia says his work speaks for himself.
Prod him further about an open letter to him by Forbes India executive editor Charles Assisi earlier this year titled 'Ankit Fadia Revealed' and Fadia says "they got it wrong".
"Charles is senior. Had I been a fake, the students wouldn't have enrolled for my certificate programmes. But, they are as they feel they are getting something good out of it. They got it wrong", he says.
Fadia, also points out that he has been asked to train at various places, including the National police Academy that establish his credentials.
Responding to increasing reports of Chinese hacking in India, Fadia says, "It happens all the time, though it has intensified of late. And what is interesting is the way they do it. The hackers make fake Facebook profiles and send friend requests to Army officers. Once they accept their request, the hackers start chatting with them on Facebook or Skype, later video-chatting with them that gives them an idea of the space surrounding the officers.
"While chatting, the hackers send the officers a zipped file on the pretext of sending photos etc which when downloaded and opened, infect the systems and confidential data becomes accessible to them", he points out.
To deal with this, the Army has recently taken initiatives including issuing strict action and termination for those violating guidelines and also introducing training programmes to create