Connect with us

Wired

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as…

Published

on

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as a red hat hacker? What’s the point of malware, is it just to be annoying? Are people who start DDoS attacks actually hackers? Amanda answers all these Twitter questions, and much more!

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Tradecraft.

ABOUT WIRED
WIRED is where tomorrow is realized.

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Continue Reading
Advertisement
76 Comments

76 Comments

  1. Wayne S

    November 8, 2019 at 2:54 pm

    She should have mentioned that Red Hat is not a type of hacker but one of the world’s leading software companies (Red Hat Enterprise Linux) which is well-known for their Linux distribution operating system, being one of the most used on desktops and servers in the world of business.

  2. Mr. J

    November 8, 2019 at 3:01 pm

    I like how penetration tester sounds.

  3. The Meme Man

    November 8, 2019 at 3:01 pm

    Her jawline kinda resembles michael jackson’s..

    Also penetration tester? Wasnt there a better name than that?

  4. Mark Jacobs

    November 8, 2019 at 3:10 pm

    She doesnt know what a grey hat hacker is

  5. Just Mavi

    November 8, 2019 at 3:11 pm

    You should have called it hacksupport, sounds better imho

  6. sweiland75

    November 8, 2019 at 3:15 pm

    None of those questions were very challenging.

    • kishenkoolskills90

      November 8, 2019 at 4:38 pm

      Yh pretty basic terms, not technical

  7. Taylor Thompson

    November 8, 2019 at 3:29 pm

    But your sooo beautiful 🥰. You can hack my soul anytime 😂

  8. nomer440

    November 8, 2019 at 3:46 pm

    That gym analogy what?

  9. nomer440

    November 8, 2019 at 3:46 pm

    Red hat is for russian hackers ;))))

  10. Kyle Blythe

    November 8, 2019 at 3:51 pm

    “Why go to the gym when you’re going to die anyways” lol deep answers and we’re only on question one

  11. Chaz Allen

    November 8, 2019 at 3:58 pm

    I think they meant “red team”, not “red hat”

  12. Lege

    November 8, 2019 at 4:06 pm

    Am I the only one who thinks that she looks like Marzia

  13. Pusalieth

    November 8, 2019 at 4:11 pm

    Red hat is the name of a corporation.

  14. Deon Spates

    November 8, 2019 at 4:17 pm

    Her PC Gear is pink! She is a LEGEND!!!

  15. Muhd Amirul

    November 8, 2019 at 4:18 pm

    I thought red hat is a software to vlsi design

  16. Pusalieth

    November 8, 2019 at 4:19 pm

    Mac and Linux are not similar. They are so different, you can’t share any code between the two. The directories are different, the kernel is different, the OS is different. They have more differences than commonalities.

  17. Pusalieth

    November 8, 2019 at 4:24 pm

    Never heard of this woman. To be honest, I’m a little skeptical. I’ve never met a pretty, well dressed, well spoken hacker. Anyone know what hacks she’s famous for?

    Edit: Turns out she’s a malware engineer. She disassembles and analyses malware. Looks like she’s got some decent threads in the field. Good for her. Definitely breaks the stereotype.

  18. kishenkoolskills90

    November 8, 2019 at 4:27 pm

    I don’t get Spam emails, People already know what Spam emails do, nobody’s dumb to put in credit/debit cards details

  19. Randimzo

    November 8, 2019 at 4:31 pm

    I’m trying to pen test your heart. <3

  20. Amudhan Manivasagam

    November 8, 2019 at 4:36 pm

    I have learned that someone actually makes PINK ETHERNET CABLES!?!?
    Seriously?

  21. Tristan McCarthy

    November 8, 2019 at 4:48 pm

    i love out of sync audio

  22. moodmusic4life

    November 8, 2019 at 4:53 pm

    She can be my penetration tester

  23. Michele Cozzarin

    November 8, 2019 at 5:01 pm

    Oh I know Black Hats, used them in Black Ops 2 all the time

  24. all_classics

    November 8, 2019 at 5:03 pm

    Her definition of Grey Hat hacker is not one I’ve heard before. Rather than being both a White Hat and Black Hat hacker at different times, a Grey Hat hacker is typically considered to have motivations more similar to a White Hat hacker, but who does not necessarily follow the same ethical standards of White Hats. For example, say a Grey Hat hacker breaks into a financial institution’s system and discovers ways to initiate transfers or obtain user data. Unlike a White Hat, they would do this without the knowledge or consent of the institution; but rather than do it for immediate personal gain like a Black Hat would (e.g., selling the personal data) they would inform the institution of the holes in their security, and offer their services to patch the security, like a White Hat.

  25. Adrees Mukhtar

    November 8, 2019 at 5:03 pm

    Smart and beautiful? Marry me already 🥰

  26. Lapis Laboratory

    November 11, 2019 at 4:00 am

    Uhh…there are most certainly more than Black, White, and Gray Hat. Red Hats are typically White Hats who do illegal things BUT for the benefit of the greater good.
    This is different than a Gray Hat who does illegal things for the same reason a Black Hat would

  27. Toro Roro

    November 11, 2019 at 4:05 am

    of course the red hat refers to the OS. come on amanda

  28. Natasha Hernandez

    November 11, 2019 at 4:08 am

    shes so cute I love her

  29. bobby boucher

    November 11, 2019 at 4:11 am

    so the gouv is cyber criminals, I knew it!

  30. Lance Boyle

    November 11, 2019 at 4:13 am

    Whenever you get paranoid about all the bad things black hats will do, think about all the white hats that are preventing it.

  31. fizzle Lor

    November 11, 2019 at 4:26 am

    Like the ski mask black is better.

  32. Jacobus Mostert

    November 11, 2019 at 4:29 am

    Red Hat is a Linux Distro…

    How could she not realise this?

  33. madd_step

    November 11, 2019 at 4:34 am

    A Red Hat hacker is someone who hacks for IBM lmao

  34. iManuelvideo

    November 11, 2019 at 4:53 am

    This is correct security must be thought about before the hardware process even begins. Especially with the IoT getting bigger and bigger and the talk of smart cities expanding among the horizon. We must enact in implementing the correct layers of security on every day to day items.

  35. Dominic Parson

    November 11, 2019 at 4:54 am

    Yup I’d eat her butt

  36. Jorqlip 1

    November 11, 2019 at 4:56 am

    If there gonna pay their tuition why not hide it by paying everyone’s tuition

  37. VaughnLive Misc

    November 11, 2019 at 5:00 am

    Blh blah blah blah blah

  38. polymphus

    November 11, 2019 at 5:12 am

    A Red Hat hacker exclusively hacks deprecated Linux distros

  39. clowning

    November 11, 2019 at 5:57 am

    Lol. Okay “hacker” fighting the right is what you tweeted, yet your company focuses more on stupid emoji context than foreign hackers meddling in our data and just overall way of life. Oh yeah plus, Facebook and Twitter sure do love censorship.

  40. Jeremy Caldwell

    November 11, 2019 at 6:01 am

    Red hat is referencing an older version of the unix Operating software.

  41. JLdaydream

    November 11, 2019 at 6:02 am

    As a complete newb, I find my self unable to tell when she is being sarcastic and when she is dishing out real advice o.o

  42. ARK 143

    November 11, 2019 at 6:02 am

    Why do your government invent olympic game to attack Iran. And now its ransomware.

  43. ᎦᏝᎬᎬᏃᎽ

    November 11, 2019 at 6:56 am

    I want to grow up to be a fashion designer if you know what I mean 😉

  44. PEI-CHI LO

    November 11, 2019 at 6:58 am

    Red hat : * confused OS noise *

  45. David Hernandez

    November 11, 2019 at 7:02 am

    Malware I want to a grey-category do you what a grey-category is how to get to that level of decoding?

  46. NeoTokyo

    November 11, 2019 at 7:02 am

    Girl is after my heart. I want a show where she is a badass hacker!

  47. Kitty

    November 11, 2019 at 7:05 am

    0:32 Here is the real answer to that question. A White hat pen test the system with approval, gives feedback to the owner, thus halting the Black hat that is trying to attack the system. A Red hat also aims to stop the black hat, but instead of pen testing their own system, they would attack the black hat instead.

    Yes, Red hat is illegal, which makes sense why cybersecurity experts may not have heard of it. There are only a few legal jobs in the US where it is allowed to do a Red hat job, like Cyberwarfare, for example.

    In short, White and Red hat’s goals is the same, but their way of operation is completely different.

    Hopes this helps.

  48. xxl ebg26

    November 11, 2019 at 7:18 am

    MaC iS eAsY tO uSe, LiNuX iS HaRd

  49. Blan_K

    November 11, 2019 at 7:19 am

    pfff…..penetration tester
    LOL XD

  50. Akhilk 99999

    November 11, 2019 at 7:20 am

    Is she the same Rousseau who is professional in playing piano and make piano covers on youtube with name “Rousseau”

  51. tub3scr3am3r

    November 17, 2019 at 5:48 am

    totally had a different thing in mind regarding “penetration tester”

  52. Kent Celicious

    November 17, 2019 at 7:52 am

    Why tf I’m listening here? I’m a CIVIL ENGINEER

  53. DJ Ceddy

    November 17, 2019 at 9:37 am

    Red hat is a linux hack? lol

  54. Tobias Wozniak

    November 17, 2019 at 10:02 am

    Wow, what a waste of time. Generic and unhelpful answers to authentically curious but unaware questions.
    How proficient are you in your field not making the connection between Red Hat and Linux?

  55. missagaga

    November 17, 2019 at 10:26 am

    I don’t hate C++
    C++ hates me

  56. HalfSlice94

    November 17, 2019 at 11:50 am

    I wanna be a perpetrator tester 🙂

  57. Dollar Hanjabam

    November 17, 2019 at 2:18 pm

    😭😭😭it has been four days since i was attack by mosk virus which is a malware and it has encrypted all my music and Anime collection of about 4tb now all i had to do is format it bc there’s no other way

  58. Ashura Paths

    November 17, 2019 at 2:54 pm

    There is basically no white,grey or black hat. it’s just hacking ethically and unethically

  59. NØFΛCE☿

    November 17, 2019 at 5:09 pm

    came here for information… found my new wife

  60. Oxnyx of The Winter Stars

    November 17, 2019 at 6:19 pm

    Red Hat Linux?

  61. Vergina Simpson

    November 17, 2019 at 6:56 pm

    4:19 doesnt answer the question at all. It’s an answer to a question that wasn’t asked.

  62. François Dillinger

    November 18, 2019 at 12:45 am

    1:04 when a wannabe uses that anonymous mask. CRINGE!

  63. ahri

    November 18, 2019 at 3:52 am

    Every person I know who works in development, engineering, and IT is male (and even my department is full of men — they’re awesome though) but I wish I knew of more women in these fields as a student, I would’ve had more confidence and direction then.

  64. CHIGGA

    November 18, 2019 at 5:19 am

    wonder whos been her bf

  65. Weebmaster 64

    November 18, 2019 at 8:42 am

    Omg,is she rousseau?

  66. shawolmblft

    November 18, 2019 at 12:49 pm

    I want to be her

  67. ReedError

    November 18, 2019 at 7:37 pm

    The NHS are finally getting with the times. They have committed to phasing out fax machines in 2020.
    [not a joke – ]

  68. slaywee

    November 18, 2019 at 9:19 pm

    “why go to gym when you gona die?” wtf that suppose to mean? you dont go to gym so you live longer. Poor choice of words you could use “why eat when you gona be hungry again” or something different.

  69. Static rain

    November 18, 2019 at 11:49 pm

    i wanna be her penetration tester

  70. Steven I.

    November 19, 2019 at 12:01 am

    Hacker Level: Default Router Password

  71. leosedf

    November 19, 2019 at 1:53 am

    Cybersecurity expert LOL. This woman probably cannot cook her own food let alone security.

  72. neil

    November 19, 2019 at 6:15 am

    She’s the prime example of why it’s so easy to hack… she doesn’t even know what “red hat” means??? Wow, please hire more like her, makes what I do so much easier. 😂

  73. JJ Bonneville

    November 19, 2019 at 12:27 pm

    why can’t we send back; hackers crap?

  74. JJ Bonneville

    November 19, 2019 at 12:31 pm

    hackers, the vile scum they are- where? so we can bear them up with guns;and old school baseball bats?

  75. JJ Bonneville

    November 19, 2019 at 12:33 pm

    Twitter sucks

Leave a Reply

Your email address will not be published. Required fields are marked *

Entertainment

We Tracked the Secret Police Microphones Hidden Everywhere | WIRED

ShotSpotter microphones are controversial surveillance devices designed to alert authorities to gunshots. But their exact locations have been kept secret from both the public and the police—until now. WIRED obtained leaked documents detailing the locations of over 25,500 of these devices, and what we learned abut how and where they’ve been deployed may surprise you.…

Published

on

ShotSpotter microphones are controversial surveillance devices designed to alert authorities to gunshots. But their exact locations have been kept secret from both the public and the police—until now. WIRED obtained leaked documents detailing the locations of over 25,500 of these devices, and what we learned abut how and where they’ve been deployed may surprise you.

Read more:

Have data or information you’d like to share with WIRED? You can reach out securely via email at [email protected] or on Signal at dmehro.89

Director: Lisandro Perez-Rey
Director of Photography: Constantine Economides
Editor: Matthew Colby
Host: Dhruv Mehrotra
Line Producer: Joseph Buscemi
Associate Producer: Paul Gulyas; Brandon White
Production Manager: Peter Brunette
Camera Operator: Chris Eustache
Sound Mixer: Sean Paulsen
Production Assistant: Ryan Coppola
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Assistant Editor: Fynn Lithgow

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

What A $250,000 Supercar Jet Ski Feels Like | WIRED

WIRED Luxury Gear Editor Jeremy White visits Shadow Six Racing in Florida to learn about and test drive the Typhoon: a quarter-million-dollar supercar jet ski that blows all competition out of the water—and there are only 8 in the world. Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►►…

Published

on

WIRED Luxury Gear Editor Jeremy White visits Shadow Six Racing in Florida to learn about and test drive the Typhoon: a quarter-million-dollar supercar jet ski that blows all competition out of the water—and there are only 8 in the world.

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Air Crash Investigator Answers Aviation Accident Questions | Tech Support | WIRED

Former National Transportation Safety Board (NTSB) Air Safety Investigator Gregory Feith joins WIRED to answers the internet’s burning questions about aviation accidents. What’s the safest seat on an airplane? How likely are you to be in an aviation accident? At what stage of flight to most accidents occur? Can a flock of birds really bring…

Published

on

Former National Transportation Safety Board (NTSB) Air Safety Investigator Gregory Feith joins WIRED to answers the internet’s burning questions about aviation accidents. What’s the safest seat on an airplane? How likely are you to be in an aviation accident? At what stage of flight to most accidents occur? Can a flock of birds really bring down a jet? Why don’t planes have parachutes to prevent crashing? What happens if a window on a plane cracks during flight? And what really happened to Malaysia Airlines Flight 370? Answers to these questions and many more await on Aviation Accident Support.

0:00 Aviation Accident Support
0:14 Safest seat on a plane
0:49 Uh, this is your captain speaking
1:30 How can birds bring down a plane?
3:30 When do accidents occur?
4:31 Accident investigation reports
5:35 Malaysia airlines flight 370
6:44 Why do planes not have parachutes?
7:09 can planes fly and land during thunderstorms?
8:32 “I was intoxicated. I drank all of those days. I drank—in excess.”
9:23 What happens if a window on a plane cracks?
9:53 Captain Sully
10:31 The probability of getting killed in an airplane accident
11:03 Snakes On A Plane
11:12 Aerophobics
12:15 Falling with style
12:37 ValuJet Flight 592
14:07 The black box and what else?
15:42 The flight data recorder
16:34 EgyptAir Flight 990 and SilkAir Flight 185
17:15 Pilot training
18:22 What’s happened to Boeing?
19:10 GPS Trackers
20:37 Can pilots actually prevent crashes
21:47 Korean Air Flight 801
22:22 Airplane Mode on phones
22:54 Aloha Airlines Flight 243

Director: Anna O’Donohue
Director of Photography: Ben Dewey
Editor: Richard Trammell
Expert: Gregory Feith
Line Producer: Joseph Buscemi
Associate Producer: Jasmine Breinburg; Brandon White
Production Manager: Peter Brunette
Casting Producer: Nicholas Sawyer
Camera Operator: Christopher Eustache
Sound Mixer: Sean Paulsen
Production Assistant: Ryan Coppola
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Jason Malizia
Assistant Editor: Andy Morell

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending