Sunny Nehra Profile picture
Founder @SecureYourHacks | Ethical Hacker | Trainer | Malware Analyst | R&D on Security Breaches || Digital Forensics | CyberSecurity | Blockchain | OSINT | AI
Aug 3, 2023 13 tweets 3 min read
FACT CHECK: Several media outlets have been quoting that the #Deepfake #Ai technology is being used by several scammers to impersonate not only faces during video calls but also the voice of victim’s friends or knowns.

A thread on fact check of the claims (reality vs hype) 👇🧵 2/ Yes, DeepFake technology does exist, but kindly understand making a “realistic” deepfake of a given general video would need 30k - 2.5 lakh images of the person.

Some media outlets quote “500 images or 10 secs video is sufficient” which isn’t the case (u can try on your own).
Aug 21, 2022 6 tweets 2 min read
A 12th class student who is excellent in coding and #cybersecurity domain asked, why should he study this level Chemistry even for IT from a good college?

Even a known IIT Professor who supports the JEE exam too much, couldn’t justify it.

It’s just that the system is outdated. Every subject is necessary BUT you will retain only a basic level of those in long UNLESS you keep applying that or that becomes your main field.

Talking about only IT, CSE etc.
For those who want to pursue career in that, they shouldn’t be forced Phy, Chem say after 9th or 10th
Aug 20, 2022 5 tweets 2 min read
A researcher found that Tiktok’s in-app browser (when you open any website in Tiktok app) monitors your keystrokes (all you type) including passwords.
In a way monitoring our inputs on third party websites.

“Those features exist in the the code but Tiktok is not using those” 🤷🏻‍♂️. 2/ I mean why does one need a feature in their app’s code that is not intended to be used.

& even if some third party made that for you, you are responsible for it if its part of your app.

Tiktok seems to be the only app with a code to monitor keystrokes of third party websites
Jun 28, 2022 9 tweets 2 min read
1/ Ok! First thing how can you say that Delhi Police should have recovered the data just within one day?

And who told you it’s that easy to recover all type of data from all devices?

& A thread 🧵 to remove some common misconceptions on recovery of deleted data from devices👇 2/ First of as this person said “even if you format 100 times” wait how would that differ from single time format?

If he meant overwriting random data or zeroes multiple times then i would like to tell that would make difference on old era tapes or drives not on modern drives.
Jun 28, 2022 4 tweets 1 min read
1/ According to a senior official of IFSO, Delhi Police

-> Mohammed Zubair was asked to produce the mobile from which he made that offensive tweet in 2018. Police found that the mobile Zubair gave during interrogation rather had a different IMEI number & is seemingly formatted. 2/ Though if it’s actually a completely formatted phone or some or many files deleted or any other case is a matter of official forensics report of the same (which will take some time).

The mobile from which tweet was made has not been found yet and is still being searched for.
Jun 27, 2022 8 tweets 2 min read
1/ Many persons are asking if FASTag cards can be cloned. Some are saying or concluded “as its passive RFID so can be easily cloned”.

The answer is NO.

People are actually confused in understanding of RFID tags & thinking all RFID tags are of same type.
Thread🧵👇 explaining it 2/ Please understand there are RFID tags that can be very easily cloned, generally cheap models that send a unique response (in fact sometimes purposely such tags are used where one wants the tag to be easily cloneable) but that’s not the thing with expensive RFID tag models.
Aug 28, 2021 7 tweets 2 min read
1/ Deepika Dhull, HR head of Vinspirer has been arrested (police custody granted till 31st aug as of now) for a scam of around 150 crores by Gurugram Police.

Around a month ago court had issued NBW against her (she was main accused).
Their clients as mentioned on their website. 2/ she was using apps like Telegram, Signal (privacy oriented and not co-operating well with authorities in providing required logs) on wi-fi networks of random restaurants, hotels while keeping her phone on aeroplane mode to maintain anonymity. It took lot efforts to track her.
Jul 20, 2020 5 tweets 2 min read
1/5
SCAM ALERT : SIM swap (and bank accounts hacking via it) nowadays is increasing!
Go through this tweets thread 👇 to be aware of a less-known (to the common public) method used by fraudsters to carry out SIM swaps nowadays.
Several persons are becoming its victim daily! 2/5
The scammers take advantage of the upgrade SIM methods created by SIM provider companies.
For example here you can see vodafone SIM upgrade method from 2G/3G to 4G by just getting a new fresh 4G sim (especially check answer to Question (Q) no 6 here) vodafone.in/content/dam/vo…
May 16, 2020 13 tweets 5 min read
1/ Go through this tweets thread👇(especially don’t miss 11/ in this thread) to understand how persons like @fs0c131y are running #propaganda against our govt apps.
It will explain how for famous govt apps claims of #hacking or security issues are made while hiding the #reality 2/ First thing is you have to look like a pro hacker like those you see in movies or web series
—> yes you thought it right! You can even use name of a famous fictional character from web series or movies say #ElliotAlderson in #MrRobot web series. How cool that is! Isn’t it?🤔
May 12, 2020 18 tweets 12 min read
1/ Few days back a hacker claimed that he has found some serious security flaws in @SetuAarogya and 90 million user's privacy is at risk and also wrote an article on medium for explanation of the issues he found. Follow the thread to know the REALITY of so called security issues. Read the bold part (that speaks the important part in brief) in tweets ahead in this thread.