Wired
Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED
Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as…
Entertainment
Megan Thee Stallion Answers The Web’s Most Searched Questions | WIRED
Musician Megan Thee Stallion visits WIRED to answer her most searched for questions on Google. Where did Megan Thee Stallion get her name? What’s her favorite anime? What is Megan Thee Stallion’s typical workout routine? What does Megan Thee Stallion call her fans? Answers to these questions and many more await on the WIRED Autocomplete…
Entertainment
Urban Designer Answers More City Planning Questions | Tech Support | WIRED
Former Chief Urban Designer of The City of New York Alex Washburn returns to WIRED to answer another round of the internet’s burning questions about city planning. How should cities accommodate electric bikes? Can urban planning mitigate over-gentrification? How can urban planning prevent crimes? What does the future of public transportation in urban centers look…
Entertainment
Scammer Payback Answers Scam Questions | Tech Support | WIRED
Pierogi from Scammer Payback on YouTube joins WIRED to answer the internet’s burning questions about scams and scambaiting. Why do scammers ask victims to buy gift cards? What are some of the biggest scammer red flags? Do they ever get caught? How many scams are out there? Should I mess with scammers for fun if…
-
Science & Technology4 years ago
Nitya Subramanian: Products and Protocol
-
CNET4 years ago
Ways you can help Black Lives Matter movement (links, orgs, and more) 👈🏽
-
Wired5 years ago
How This Guy Became a World Champion Boomerang Thrower | WIRED
-
People & Blogs3 years ago
Sleep Expert Answers Questions From Twitter 💤 | Tech Support | WIRED
-
Wired5 years ago
Neuroscientist Explains ASMR’s Effects on the Brain & The Body | WIRED
-
Wired5 years ago
Why It’s Almost Impossible to Solve a Rubik’s Cube in Under 3 Seconds | WIRED
-
Wired5 years ago
Former FBI Agent Explains How to Read Body Language | Tradecraft | WIRED
-
CNET5 years ago
Surface Pro 7 review: Hello, old friend 🧙
Wayne S
November 8, 2019 at 2:54 pm
She should have mentioned that Red Hat is not a type of hacker but one of the world’s leading software companies (Red Hat Enterprise Linux) which is well-known for their Linux distribution operating system, being one of the most used on desktops and servers in the world of business.
Mr. J
November 8, 2019 at 3:01 pm
I like how penetration tester sounds.
The Meme Man
November 8, 2019 at 3:01 pm
Her jawline kinda resembles michael jackson’s..
Also penetration tester? Wasnt there a better name than that?
Mark Jacobs
November 8, 2019 at 3:10 pm
She doesnt know what a grey hat hacker is
Just Mavi
November 8, 2019 at 3:11 pm
You should have called it hacksupport, sounds better imho
sweiland75
November 8, 2019 at 3:15 pm
None of those questions were very challenging.
kishenkoolskills90
November 8, 2019 at 4:38 pm
Yh pretty basic terms, not technical
Taylor Thompson
November 8, 2019 at 3:29 pm
But your sooo beautiful 🥰. You can hack my soul anytime 😂
nomer440
November 8, 2019 at 3:46 pm
That gym analogy what?
nomer440
November 8, 2019 at 3:46 pm
Red hat is for russian hackers ;))))
Kyle Blythe
November 8, 2019 at 3:51 pm
“Why go to the gym when you’re going to die anyways” lol deep answers and we’re only on question one
Chaz Allen
November 8, 2019 at 3:58 pm
I think they meant “red team”, not “red hat”
Lege
November 8, 2019 at 4:06 pm
Am I the only one who thinks that she looks like Marzia
Pusalieth
November 8, 2019 at 4:11 pm
Red hat is the name of a corporation.
Deon Spates
November 8, 2019 at 4:17 pm
Her PC Gear is pink! She is a LEGEND!!!
Muhd Amirul
November 8, 2019 at 4:18 pm
I thought red hat is a software to vlsi design
Pusalieth
November 8, 2019 at 4:19 pm
Mac and Linux are not similar. They are so different, you can’t share any code between the two. The directories are different, the kernel is different, the OS is different. They have more differences than commonalities.
Pusalieth
November 8, 2019 at 4:24 pm
Never heard of this woman. To be honest, I’m a little skeptical. I’ve never met a pretty, well dressed, well spoken hacker. Anyone know what hacks she’s famous for?
Edit: Turns out she’s a malware engineer. She disassembles and analyses malware. Looks like she’s got some decent threads in the field. Good for her. Definitely breaks the stereotype.
kishenkoolskills90
November 8, 2019 at 4:27 pm
I don’t get Spam emails, People already know what Spam emails do, nobody’s dumb to put in credit/debit cards details
Randimzo
November 8, 2019 at 4:31 pm
I’m trying to pen test your heart. <3
Amudhan Manivasagam
November 8, 2019 at 4:36 pm
I have learned that someone actually makes PINK ETHERNET CABLES!?!?
Seriously?
Tristan McCarthy
November 8, 2019 at 4:48 pm
i love out of sync audio
moodmusic4life
November 8, 2019 at 4:53 pm
She can be my penetration tester
Michele Cozzarin
November 8, 2019 at 5:01 pm
Oh I know Black Hats, used them in Black Ops 2 all the time
all_classics
November 8, 2019 at 5:03 pm
Her definition of Grey Hat hacker is not one I’ve heard before. Rather than being both a White Hat and Black Hat hacker at different times, a Grey Hat hacker is typically considered to have motivations more similar to a White Hat hacker, but who does not necessarily follow the same ethical standards of White Hats. For example, say a Grey Hat hacker breaks into a financial institution’s system and discovers ways to initiate transfers or obtain user data. Unlike a White Hat, they would do this without the knowledge or consent of the institution; but rather than do it for immediate personal gain like a Black Hat would (e.g., selling the personal data) they would inform the institution of the holes in their security, and offer their services to patch the security, like a White Hat.
Adrees Mukhtar
November 8, 2019 at 5:03 pm
Smart and beautiful? Marry me already 🥰
Lapis Laboratory
November 11, 2019 at 4:00 am
Uhh…there are most certainly more than Black, White, and Gray Hat. Red Hats are typically White Hats who do illegal things BUT for the benefit of the greater good.
This is different than a Gray Hat who does illegal things for the same reason a Black Hat would
Toro Roro
November 11, 2019 at 4:05 am
of course the red hat refers to the OS. come on amanda
Natasha Hernandez
November 11, 2019 at 4:08 am
shes so cute I love her
bobby boucher
November 11, 2019 at 4:11 am
so the gouv is cyber criminals, I knew it!
Lance Boyle
November 11, 2019 at 4:13 am
Whenever you get paranoid about all the bad things black hats will do, think about all the white hats that are preventing it.
fizzle Lor
November 11, 2019 at 4:26 am
Like the ski mask black is better.
Jacobus Mostert
November 11, 2019 at 4:29 am
Red Hat is a Linux Distro…
How could she not realise this?
madd_step
November 11, 2019 at 4:34 am
A Red Hat hacker is someone who hacks for IBM lmao
iManuelvideo
November 11, 2019 at 4:53 am
This is correct security must be thought about before the hardware process even begins. Especially with the IoT getting bigger and bigger and the talk of smart cities expanding among the horizon. We must enact in implementing the correct layers of security on every day to day items.
Dominic Parson
November 11, 2019 at 4:54 am
Yup I’d eat her butt
Jorqlip 1
November 11, 2019 at 4:56 am
If there gonna pay their tuition why not hide it by paying everyone’s tuition
VaughnLive Misc
November 11, 2019 at 5:00 am
Blh blah blah blah blah
polymphus
November 11, 2019 at 5:12 am
A Red Hat hacker exclusively hacks deprecated Linux distros
clowning
November 11, 2019 at 5:57 am
Lol. Okay “hacker” fighting the right is what you tweeted, yet your company focuses more on stupid emoji context than foreign hackers meddling in our data and just overall way of life. Oh yeah plus, Facebook and Twitter sure do love censorship.
Jeremy Caldwell
November 11, 2019 at 6:01 am
Red hat is referencing an older version of the unix Operating software.
JLdaydream
November 11, 2019 at 6:02 am
As a complete newb, I find my self unable to tell when she is being sarcastic and when she is dishing out real advice o.o
ARK 143
November 11, 2019 at 6:02 am
Why do your government invent olympic game to attack Iran. And now its ransomware.
ᎦᏝᎬᎬᏃᎽ
November 11, 2019 at 6:56 am
I want to grow up to be a fashion designer if you know what I mean 😉
PEI-CHI LO
November 11, 2019 at 6:58 am
Red hat : * confused OS noise *
David Hernandez
November 11, 2019 at 7:02 am
Malware I want to a grey-category do you what a grey-category is how to get to that level of decoding?
NeoTokyo
November 11, 2019 at 7:02 am
Girl is after my heart. I want a show where she is a badass hacker!
Kitty
November 11, 2019 at 7:05 am
0:32 Here is the real answer to that question. A White hat pen test the system with approval, gives feedback to the owner, thus halting the Black hat that is trying to attack the system. A Red hat also aims to stop the black hat, but instead of pen testing their own system, they would attack the black hat instead.
Yes, Red hat is illegal, which makes sense why cybersecurity experts may not have heard of it. There are only a few legal jobs in the US where it is allowed to do a Red hat job, like Cyberwarfare, for example.
In short, White and Red hat’s goals is the same, but their way of operation is completely different.
Hopes this helps.
xxl ebg26
November 11, 2019 at 7:18 am
MaC iS eAsY tO uSe, LiNuX iS HaRd
Blan_K
November 11, 2019 at 7:19 am
pfff…..penetration tester
LOL XD
Akhilk 99999
November 11, 2019 at 7:20 am
Is she the same Rousseau who is professional in playing piano and make piano covers on youtube with name “Rousseau”
tub3scr3am3r
November 17, 2019 at 5:48 am
totally had a different thing in mind regarding “penetration tester”
Kent Celicious
November 17, 2019 at 7:52 am
Why tf I’m listening here? I’m a CIVIL ENGINEER
DJ Ceddy
November 17, 2019 at 9:37 am
Red hat is a linux hack? lol
Tobias Wozniak
November 17, 2019 at 10:02 am
Wow, what a waste of time. Generic and unhelpful answers to authentically curious but unaware questions.
How proficient are you in your field not making the connection between Red Hat and Linux?
missagaga
November 17, 2019 at 10:26 am
I don’t hate C++
C++ hates me
HalfSlice94
November 17, 2019 at 11:50 am
I wanna be a perpetrator tester 🙂
Dollar Hanjabam
November 17, 2019 at 2:18 pm
😭😭😭it has been four days since i was attack by mosk virus which is a malware and it has encrypted all my music and Anime collection of about 4tb now all i had to do is format it bc there’s no other way
Ashura Paths
November 17, 2019 at 2:54 pm
There is basically no white,grey or black hat. it’s just hacking ethically and unethically
NØFΛCE☿
November 17, 2019 at 5:09 pm
came here for information… found my new wife
Oxnyx of The Winter Stars
November 17, 2019 at 6:19 pm
Red Hat Linux?
Vergina Simpson
November 17, 2019 at 6:56 pm
4:19 doesnt answer the question at all. It’s an answer to a question that wasn’t asked.
François Dillinger
November 18, 2019 at 12:45 am
1:04 when a wannabe uses that anonymous mask. CRINGE!
ahri
November 18, 2019 at 3:52 am
Every person I know who works in development, engineering, and IT is male (and even my department is full of men — they’re awesome though) but I wish I knew of more women in these fields as a student, I would’ve had more confidence and direction then.
CHIGGA
November 18, 2019 at 5:19 am
wonder whos been her bf
Weebmaster 64
November 18, 2019 at 8:42 am
Omg,is she rousseau?
shawolmblft
November 18, 2019 at 12:49 pm
I want to be her
ReedError
November 18, 2019 at 7:37 pm
The NHS are finally getting with the times. They have committed to phasing out fax machines in 2020.
[not a joke – ]
slaywee
November 18, 2019 at 9:19 pm
“why go to gym when you gona die?” wtf that suppose to mean? you dont go to gym so you live longer. Poor choice of words you could use “why eat when you gona be hungry again” or something different.
Static rain
November 18, 2019 at 11:49 pm
i wanna be her penetration tester
Steven I.
November 19, 2019 at 12:01 am
Hacker Level: Default Router Password
leosedf
November 19, 2019 at 1:53 am
Cybersecurity expert LOL. This woman probably cannot cook her own food let alone security.
neil
November 19, 2019 at 6:15 am
She’s the prime example of why it’s so easy to hack… she doesn’t even know what “red hat” means??? Wow, please hire more like her, makes what I do so much easier. 😂
JJ Bonneville
November 19, 2019 at 12:27 pm
why can’t we send back; hackers crap?
JJ Bonneville
November 19, 2019 at 12:31 pm
hackers, the vile scum they are- where? so we can bear them up with guns;and old school baseball bats?
JJ Bonneville
November 19, 2019 at 12:33 pm
Twitter sucks