Connect with us

Wired

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as…

Published

on

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as a red hat hacker? What’s the point of malware, is it just to be annoying? Are people who start DDoS attacks actually hackers? Amanda answers all these Twitter questions, and much more!

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Tradecraft.

ABOUT WIRED
WIRED is where tomorrow is realized.

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Continue Reading
Advertisement
76 Comments

76 Comments

  1. Wayne S

    November 8, 2019 at 2:54 pm

    She should have mentioned that Red Hat is not a type of hacker but one of the world’s leading software companies (Red Hat Enterprise Linux) which is well-known for their Linux distribution operating system, being one of the most used on desktops and servers in the world of business.

  2. Mr. J

    November 8, 2019 at 3:01 pm

    I like how penetration tester sounds.

  3. The Meme Man

    November 8, 2019 at 3:01 pm

    Her jawline kinda resembles michael jackson’s..

    Also penetration tester? Wasnt there a better name than that?

  4. Mark Jacobs

    November 8, 2019 at 3:10 pm

    She doesnt know what a grey hat hacker is

  5. Just Mavi

    November 8, 2019 at 3:11 pm

    You should have called it hacksupport, sounds better imho

  6. sweiland75

    November 8, 2019 at 3:15 pm

    None of those questions were very challenging.

    • kishenkoolskills90

      November 8, 2019 at 4:38 pm

      Yh pretty basic terms, not technical

  7. Taylor Thompson

    November 8, 2019 at 3:29 pm

    But your sooo beautiful 🥰. You can hack my soul anytime 😂

  8. nomer440

    November 8, 2019 at 3:46 pm

    That gym analogy what?

  9. nomer440

    November 8, 2019 at 3:46 pm

    Red hat is for russian hackers ;))))

  10. Kyle Blythe

    November 8, 2019 at 3:51 pm

    “Why go to the gym when you’re going to die anyways” lol deep answers and we’re only on question one

  11. Chaz Allen

    November 8, 2019 at 3:58 pm

    I think they meant “red team”, not “red hat”

  12. Lege

    November 8, 2019 at 4:06 pm

    Am I the only one who thinks that she looks like Marzia

  13. Pusalieth

    November 8, 2019 at 4:11 pm

    Red hat is the name of a corporation.

  14. Deon Spates

    November 8, 2019 at 4:17 pm

    Her PC Gear is pink! She is a LEGEND!!!

  15. Muhd Amirul

    November 8, 2019 at 4:18 pm

    I thought red hat is a software to vlsi design

  16. Pusalieth

    November 8, 2019 at 4:19 pm

    Mac and Linux are not similar. They are so different, you can’t share any code between the two. The directories are different, the kernel is different, the OS is different. They have more differences than commonalities.

  17. Pusalieth

    November 8, 2019 at 4:24 pm

    Never heard of this woman. To be honest, I’m a little skeptical. I’ve never met a pretty, well dressed, well spoken hacker. Anyone know what hacks she’s famous for?

    Edit: Turns out she’s a malware engineer. She disassembles and analyses malware. Looks like she’s got some decent threads in the field. Good for her. Definitely breaks the stereotype.

  18. kishenkoolskills90

    November 8, 2019 at 4:27 pm

    I don’t get Spam emails, People already know what Spam emails do, nobody’s dumb to put in credit/debit cards details

  19. Randimzo

    November 8, 2019 at 4:31 pm

    I’m trying to pen test your heart. <3

  20. Amudhan Manivasagam

    November 8, 2019 at 4:36 pm

    I have learned that someone actually makes PINK ETHERNET CABLES!?!?
    Seriously?

  21. Tristan McCarthy

    November 8, 2019 at 4:48 pm

    i love out of sync audio

  22. moodmusic4life

    November 8, 2019 at 4:53 pm

    She can be my penetration tester

  23. Michele Cozzarin

    November 8, 2019 at 5:01 pm

    Oh I know Black Hats, used them in Black Ops 2 all the time

  24. all_classics

    November 8, 2019 at 5:03 pm

    Her definition of Grey Hat hacker is not one I’ve heard before. Rather than being both a White Hat and Black Hat hacker at different times, a Grey Hat hacker is typically considered to have motivations more similar to a White Hat hacker, but who does not necessarily follow the same ethical standards of White Hats. For example, say a Grey Hat hacker breaks into a financial institution’s system and discovers ways to initiate transfers or obtain user data. Unlike a White Hat, they would do this without the knowledge or consent of the institution; but rather than do it for immediate personal gain like a Black Hat would (e.g., selling the personal data) they would inform the institution of the holes in their security, and offer their services to patch the security, like a White Hat.

  25. Adrees Mukhtar

    November 8, 2019 at 5:03 pm

    Smart and beautiful? Marry me already 🥰

  26. Lapis Laboratory

    November 11, 2019 at 4:00 am

    Uhh…there are most certainly more than Black, White, and Gray Hat. Red Hats are typically White Hats who do illegal things BUT for the benefit of the greater good.
    This is different than a Gray Hat who does illegal things for the same reason a Black Hat would

  27. Toro Roro

    November 11, 2019 at 4:05 am

    of course the red hat refers to the OS. come on amanda

  28. Natasha Hernandez

    November 11, 2019 at 4:08 am

    shes so cute I love her

  29. bobby boucher

    November 11, 2019 at 4:11 am

    so the gouv is cyber criminals, I knew it!

  30. Lance Boyle

    November 11, 2019 at 4:13 am

    Whenever you get paranoid about all the bad things black hats will do, think about all the white hats that are preventing it.

  31. fizzle Lor

    November 11, 2019 at 4:26 am

    Like the ski mask black is better.

  32. Jacobus Mostert

    November 11, 2019 at 4:29 am

    Red Hat is a Linux Distro…

    How could she not realise this?

  33. madd_step

    November 11, 2019 at 4:34 am

    A Red Hat hacker is someone who hacks for IBM lmao

  34. iManuelvideo

    November 11, 2019 at 4:53 am

    This is correct security must be thought about before the hardware process even begins. Especially with the IoT getting bigger and bigger and the talk of smart cities expanding among the horizon. We must enact in implementing the correct layers of security on every day to day items.

  35. Dominic Parson

    November 11, 2019 at 4:54 am

    Yup I’d eat her butt

  36. Jorqlip 1

    November 11, 2019 at 4:56 am

    If there gonna pay their tuition why not hide it by paying everyone’s tuition

  37. VaughnLive Misc

    November 11, 2019 at 5:00 am

    Blh blah blah blah blah

  38. polymphus

    November 11, 2019 at 5:12 am

    A Red Hat hacker exclusively hacks deprecated Linux distros

  39. clowning

    November 11, 2019 at 5:57 am

    Lol. Okay “hacker” fighting the right is what you tweeted, yet your company focuses more on stupid emoji context than foreign hackers meddling in our data and just overall way of life. Oh yeah plus, Facebook and Twitter sure do love censorship.

  40. Jeremy Caldwell

    November 11, 2019 at 6:01 am

    Red hat is referencing an older version of the unix Operating software.

  41. JLdaydream

    November 11, 2019 at 6:02 am

    As a complete newb, I find my self unable to tell when she is being sarcastic and when she is dishing out real advice o.o

  42. ARK 143

    November 11, 2019 at 6:02 am

    Why do your government invent olympic game to attack Iran. And now its ransomware.

  43. ᎦᏝᎬᎬᏃᎽ

    November 11, 2019 at 6:56 am

    I want to grow up to be a fashion designer if you know what I mean 😉

  44. PEI-CHI LO

    November 11, 2019 at 6:58 am

    Red hat : * confused OS noise *

  45. David Hernandez

    November 11, 2019 at 7:02 am

    Malware I want to a grey-category do you what a grey-category is how to get to that level of decoding?

  46. NeoTokyo

    November 11, 2019 at 7:02 am

    Girl is after my heart. I want a show where she is a badass hacker!

  47. Kitty

    November 11, 2019 at 7:05 am

    0:32 Here is the real answer to that question. A White hat pen test the system with approval, gives feedback to the owner, thus halting the Black hat that is trying to attack the system. A Red hat also aims to stop the black hat, but instead of pen testing their own system, they would attack the black hat instead.

    Yes, Red hat is illegal, which makes sense why cybersecurity experts may not have heard of it. There are only a few legal jobs in the US where it is allowed to do a Red hat job, like Cyberwarfare, for example.

    In short, White and Red hat’s goals is the same, but their way of operation is completely different.

    Hopes this helps.

  48. xxl ebg26

    November 11, 2019 at 7:18 am

    MaC iS eAsY tO uSe, LiNuX iS HaRd

  49. Blan_K

    November 11, 2019 at 7:19 am

    pfff…..penetration tester
    LOL XD

  50. Akhilk 99999

    November 11, 2019 at 7:20 am

    Is she the same Rousseau who is professional in playing piano and make piano covers on youtube with name “Rousseau”

  51. tub3scr3am3r

    November 17, 2019 at 5:48 am

    totally had a different thing in mind regarding “penetration tester”

  52. Kent Celicious

    November 17, 2019 at 7:52 am

    Why tf I’m listening here? I’m a CIVIL ENGINEER

  53. DJ Ceddy

    November 17, 2019 at 9:37 am

    Red hat is a linux hack? lol

  54. Tobias Wozniak

    November 17, 2019 at 10:02 am

    Wow, what a waste of time. Generic and unhelpful answers to authentically curious but unaware questions.
    How proficient are you in your field not making the connection between Red Hat and Linux?

  55. missagaga

    November 17, 2019 at 10:26 am

    I don’t hate C++
    C++ hates me

  56. HalfSlice94

    November 17, 2019 at 11:50 am

    I wanna be a perpetrator tester 🙂

  57. Dollar Hanjabam

    November 17, 2019 at 2:18 pm

    😭😭😭it has been four days since i was attack by mosk virus which is a malware and it has encrypted all my music and Anime collection of about 4tb now all i had to do is format it bc there’s no other way

  58. Ashura Paths

    November 17, 2019 at 2:54 pm

    There is basically no white,grey or black hat. it’s just hacking ethically and unethically

  59. NØFΛCE☿

    November 17, 2019 at 5:09 pm

    came here for information… found my new wife

  60. Oxnyx of The Winter Stars

    November 17, 2019 at 6:19 pm

    Red Hat Linux?

  61. Vergina Simpson

    November 17, 2019 at 6:56 pm

    4:19 doesnt answer the question at all. It’s an answer to a question that wasn’t asked.

  62. François Dillinger

    November 18, 2019 at 12:45 am

    1:04 when a wannabe uses that anonymous mask. CRINGE!

  63. ahri

    November 18, 2019 at 3:52 am

    Every person I know who works in development, engineering, and IT is male (and even my department is full of men — they’re awesome though) but I wish I knew of more women in these fields as a student, I would’ve had more confidence and direction then.

  64. CHIGGA

    November 18, 2019 at 5:19 am

    wonder whos been her bf

  65. Weebmaster 64

    November 18, 2019 at 8:42 am

    Omg,is she rousseau?

  66. shawolmblft

    November 18, 2019 at 12:49 pm

    I want to be her

  67. ReedError

    November 18, 2019 at 7:37 pm

    The NHS are finally getting with the times. They have committed to phasing out fax machines in 2020.
    [not a joke – ]

  68. slaywee

    November 18, 2019 at 9:19 pm

    “why go to gym when you gona die?” wtf that suppose to mean? you dont go to gym so you live longer. Poor choice of words you could use “why eat when you gona be hungry again” or something different.

  69. Static rain

    November 18, 2019 at 11:49 pm

    i wanna be her penetration tester

  70. Steven I.

    November 19, 2019 at 12:01 am

    Hacker Level: Default Router Password

  71. leosedf

    November 19, 2019 at 1:53 am

    Cybersecurity expert LOL. This woman probably cannot cook her own food let alone security.

  72. neil

    November 19, 2019 at 6:15 am

    She’s the prime example of why it’s so easy to hack… she doesn’t even know what “red hat” means??? Wow, please hire more like her, makes what I do so much easier. 😂

  73. JJ Bonneville

    November 19, 2019 at 12:27 pm

    why can’t we send back; hackers crap?

  74. JJ Bonneville

    November 19, 2019 at 12:31 pm

    hackers, the vile scum they are- where? so we can bear them up with guns;and old school baseball bats?

  75. JJ Bonneville

    November 19, 2019 at 12:33 pm

    Twitter sucks

Leave a Reply

Your email address will not be published. Required fields are marked *

Entertainment

Megan Thee Stallion Answers The Web’s Most Searched Questions | WIRED

Musician Megan Thee Stallion visits WIRED to answer her most searched for questions on Google. Where did Megan Thee Stallion get her name? What’s her favorite anime? What is Megan Thee Stallion’s typical workout routine? What does Megan Thee Stallion call her fans? Answers to these questions and many more await on the WIRED Autocomplete…

Published

on

Musician Megan Thee Stallion visits WIRED to answer her most searched for questions on Google. Where did Megan Thee Stallion get her name? What’s her favorite anime? What is Megan Thee Stallion’s typical workout routine? What does Megan Thee Stallion call her fans? Answers to these questions and many more await on the WIRED Autocomplete Interview.

‘Megan Thee Stallion: In Her Words’ is now streaming on Prime Video.

Megan Thee Stallion’s deluxe album ‘Megan: Act II” is now available to stream.

Director: Justin Wolfson
Director of Photography: Kevin Dynia
Editor: Daniel Poler
Talent: Megan Thee Stallion
Line Producer: Joseph Buscemi
Associate Producer: Brandon White; Paul Gulyas
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Talent Booker: Jenna Caldwell
Camera Operator: Caleb Weiss
Sound Mixer: Michael Guggino
Production Assistant: Ryan Coppola
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Jason Malizia
Assistant Editor: Justin Symonds

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Urban Designer Answers More City Planning Questions | Tech Support | WIRED

Former Chief Urban Designer of The City of New York Alex Washburn returns to WIRED to answer another round of the internet’s burning questions about city planning. How should cities accommodate electric bikes? Can urban planning mitigate over-gentrification? How can urban planning prevent crimes? What does the future of public transportation in urban centers look…

Published

on

Former Chief Urban Designer of The City of New York Alex Washburn returns to WIRED to answer another round of the internet’s burning questions about city planning. How should cities accommodate electric bikes? Can urban planning mitigate over-gentrification? How can urban planning prevent crimes? What does the future of public transportation in urban centers look like? Can a city ever reach population capacity? How’s it possible for a city to run out of water? Alex Washburn answers these questions and many more on City Planning Support, Vol. 2.

0:00 City Planning Support Rd. 2
0:15 How to accommodate electric bikes in cities
1:05 Gentrification
2:29 Living in the sprawl
3:43 Can urban planning reduce crime?
4:08 Booooring
4:58 Trees
5:51 If you build it will they come?
6:42 The future of public transportation
7:25 The Big Dig was a Big Dub
8:24 Sustainable cities
8:59 Why do taxpayers subsidize stadiums?
9:59 Hyperloop/Maglev
11:02 Concrete was a poor choice
12:23 Windmills on every building
13:08 Superblocks/Tartan Grid
14:40 Looks familiar!
15:31 Can a city reach capacity?
16:14 Favelas
17:12 please bro, just one more parking lot
18:22 NYC housing costs
19:25 Congestion pricing
19:58 Hall of Fame: Brasilia
20:55 Running out of water

Director: Justin Wolfson
Director of Photography: Constantine Economides
Editor: Richard Trammell
Expert: Alex Washburn
Line Producer: Joseph Buscemi
Associate Producer: Brandon White
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Casting Producer: Nicholas Sawyer
Camera Operator: Christopher Eustache
Sound Mixer: Sean Paulsen
Production Assistant: Kalia Simms
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Jason Malizia
Assistant Editor: Billy Ward

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Scammer Payback Answers Scam Questions | Tech Support | WIRED

Pierogi from Scammer Payback on YouTube joins WIRED to answer the internet’s burning questions about scams and scambaiting. Why do scammers ask victims to buy gift cards? What are some of the biggest scammer red flags? Do they ever get caught? How many scams are out there? Should I mess with scammers for fun if…

Published

on

Pierogi from Scammer Payback on YouTube joins WIRED to answer the internet’s burning questions about scams and scambaiting. Why do scammers ask victims to buy gift cards? What are some of the biggest scammer red flags? Do they ever get caught? How many scams are out there? Should I mess with scammers for fun if I identify one? What software and hardware does Scammer Payback use? How can those creepy sex bot internet commenters lead to a scam? Pierogi answers these questions and many more on Scambaiting Support.

0:00 Scambaiting Support
0:27 Scammer red flags
1:12 Scammers and Gift cards
1:39 How many scams are out there?
2:13 Messing with scammers for fun
3:54 Scambaiting: Origins
4:24 Random scam texts
4:57 Most scammed social media platform
5:23 Can scam texts track your phone?
6:16 Amazon scam LIVE
7:03 The most absurd scam call ever
7:42 Voice changing/Scammer Payback Setup
8:41 Phone number spoofing—how?
9:08 Scammed out of your crypto
10:13 Benefits? PTO? How about a 401K Match?
11:06 How do the creepy bots make money?
12:18 Programs
12:41 …….
13:08 Some common senior citizen scams
14:35 How do scam call centers work?
15:37 Money mule address
17:50 Someone hacked my amazon account! But…
18:58 How did they get past my 2FA?
19:56 Is public wifi safe? Is VPN good?
20:42 Gaining access to scammers machines
21:36 The epicenter of call centers?
22:48 Pierogi > Police?
23:21 Let’s move this convo over to WhatsApp
23:59 Scam Likely
24:19 Fake shopping sites/The Cat
25:27 Do scammers ever get caught?
26:00 Caught in a PayPal scam
26:31 I want my money back
26:45 Meet the team

Director: Lisandro Perez-Rey
Director of Photography: Mark Denney
Editor: Richard Trammell
Expert: Pierogi
Line Producer: Joseph Buscemi
Associate Producer: Paul Gulyas
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Talent Booker: Mica Medoff
Camera Operator: Franz Criscione
Sound Mixer: Mark Cochran
Production Assistant: Reed Vrooman
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Paul Tael; Jason Malizia
Assistant Editor: Billy Ward
Special Thanks: The Entire Scammer Payback Team

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending