Connect with us

Wired

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as…

Published

on

Facebook Offensive Security Engineer Amanda Rousseau aka “Malware Unicorn” uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as a red hat hacker? What’s the point of malware, is it just to be annoying? Are people who start DDoS attacks actually hackers? Amanda answers all these Twitter questions, and much more!

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Tradecraft.

ABOUT WIRED
WIRED is where tomorrow is realized.

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Continue Reading
Advertisement
76 Comments

76 Comments

  1. Wayne S

    November 8, 2019 at 2:54 pm

    She should have mentioned that Red Hat is not a type of hacker but one of the world’s leading software companies (Red Hat Enterprise Linux) which is well-known for their Linux distribution operating system, being one of the most used on desktops and servers in the world of business.

  2. Mr. J

    November 8, 2019 at 3:01 pm

    I like how penetration tester sounds.

  3. The Meme Man

    November 8, 2019 at 3:01 pm

    Her jawline kinda resembles michael jackson’s..

    Also penetration tester? Wasnt there a better name than that?

  4. Mark Jacobs

    November 8, 2019 at 3:10 pm

    She doesnt know what a grey hat hacker is

  5. Just Mavi

    November 8, 2019 at 3:11 pm

    You should have called it hacksupport, sounds better imho

  6. sweiland75

    November 8, 2019 at 3:15 pm

    None of those questions were very challenging.

    • kishenkoolskills90

      November 8, 2019 at 4:38 pm

      Yh pretty basic terms, not technical

  7. Taylor Thompson

    November 8, 2019 at 3:29 pm

    But your sooo beautiful 🥰. You can hack my soul anytime 😂

  8. nomer440

    November 8, 2019 at 3:46 pm

    That gym analogy what?

  9. nomer440

    November 8, 2019 at 3:46 pm

    Red hat is for russian hackers ;))))

  10. Kyle Blythe

    November 8, 2019 at 3:51 pm

    “Why go to the gym when you’re going to die anyways” lol deep answers and we’re only on question one

  11. Chaz Allen

    November 8, 2019 at 3:58 pm

    I think they meant “red team”, not “red hat”

  12. Lege

    November 8, 2019 at 4:06 pm

    Am I the only one who thinks that she looks like Marzia

  13. Pusalieth

    November 8, 2019 at 4:11 pm

    Red hat is the name of a corporation.

  14. Deon Spates

    November 8, 2019 at 4:17 pm

    Her PC Gear is pink! She is a LEGEND!!!

  15. Muhd Amirul

    November 8, 2019 at 4:18 pm

    I thought red hat is a software to vlsi design

  16. Pusalieth

    November 8, 2019 at 4:19 pm

    Mac and Linux are not similar. They are so different, you can’t share any code between the two. The directories are different, the kernel is different, the OS is different. They have more differences than commonalities.

  17. Pusalieth

    November 8, 2019 at 4:24 pm

    Never heard of this woman. To be honest, I’m a little skeptical. I’ve never met a pretty, well dressed, well spoken hacker. Anyone know what hacks she’s famous for?

    Edit: Turns out she’s a malware engineer. She disassembles and analyses malware. Looks like she’s got some decent threads in the field. Good for her. Definitely breaks the stereotype.

  18. kishenkoolskills90

    November 8, 2019 at 4:27 pm

    I don’t get Spam emails, People already know what Spam emails do, nobody’s dumb to put in credit/debit cards details

  19. Randimzo

    November 8, 2019 at 4:31 pm

    I’m trying to pen test your heart. <3

  20. Amudhan Manivasagam

    November 8, 2019 at 4:36 pm

    I have learned that someone actually makes PINK ETHERNET CABLES!?!?
    Seriously?

  21. Tristan McCarthy

    November 8, 2019 at 4:48 pm

    i love out of sync audio

  22. moodmusic4life

    November 8, 2019 at 4:53 pm

    She can be my penetration tester

  23. Michele Cozzarin

    November 8, 2019 at 5:01 pm

    Oh I know Black Hats, used them in Black Ops 2 all the time

  24. all_classics

    November 8, 2019 at 5:03 pm

    Her definition of Grey Hat hacker is not one I’ve heard before. Rather than being both a White Hat and Black Hat hacker at different times, a Grey Hat hacker is typically considered to have motivations more similar to a White Hat hacker, but who does not necessarily follow the same ethical standards of White Hats. For example, say a Grey Hat hacker breaks into a financial institution’s system and discovers ways to initiate transfers or obtain user data. Unlike a White Hat, they would do this without the knowledge or consent of the institution; but rather than do it for immediate personal gain like a Black Hat would (e.g., selling the personal data) they would inform the institution of the holes in their security, and offer their services to patch the security, like a White Hat.

  25. Adrees Mukhtar

    November 8, 2019 at 5:03 pm

    Smart and beautiful? Marry me already 🥰

  26. Lapis Laboratory

    November 11, 2019 at 4:00 am

    Uhh…there are most certainly more than Black, White, and Gray Hat. Red Hats are typically White Hats who do illegal things BUT for the benefit of the greater good.
    This is different than a Gray Hat who does illegal things for the same reason a Black Hat would

  27. Toro Roro

    November 11, 2019 at 4:05 am

    of course the red hat refers to the OS. come on amanda

  28. Natasha Hernandez

    November 11, 2019 at 4:08 am

    shes so cute I love her

  29. bobby boucher

    November 11, 2019 at 4:11 am

    so the gouv is cyber criminals, I knew it!

  30. Lance Boyle

    November 11, 2019 at 4:13 am

    Whenever you get paranoid about all the bad things black hats will do, think about all the white hats that are preventing it.

  31. fizzle Lor

    November 11, 2019 at 4:26 am

    Like the ski mask black is better.

  32. Jacobus Mostert

    November 11, 2019 at 4:29 am

    Red Hat is a Linux Distro…

    How could she not realise this?

  33. madd_step

    November 11, 2019 at 4:34 am

    A Red Hat hacker is someone who hacks for IBM lmao

  34. iManuelvideo

    November 11, 2019 at 4:53 am

    This is correct security must be thought about before the hardware process even begins. Especially with the IoT getting bigger and bigger and the talk of smart cities expanding among the horizon. We must enact in implementing the correct layers of security on every day to day items.

  35. Dominic Parson

    November 11, 2019 at 4:54 am

    Yup I’d eat her butt

  36. Jorqlip 1

    November 11, 2019 at 4:56 am

    If there gonna pay their tuition why not hide it by paying everyone’s tuition

  37. VaughnLive Misc

    November 11, 2019 at 5:00 am

    Blh blah blah blah blah

  38. polymphus

    November 11, 2019 at 5:12 am

    A Red Hat hacker exclusively hacks deprecated Linux distros

  39. clowning

    November 11, 2019 at 5:57 am

    Lol. Okay “hacker” fighting the right is what you tweeted, yet your company focuses more on stupid emoji context than foreign hackers meddling in our data and just overall way of life. Oh yeah plus, Facebook and Twitter sure do love censorship.

  40. Jeremy Caldwell

    November 11, 2019 at 6:01 am

    Red hat is referencing an older version of the unix Operating software.

  41. JLdaydream

    November 11, 2019 at 6:02 am

    As a complete newb, I find my self unable to tell when she is being sarcastic and when she is dishing out real advice o.o

  42. ARK 143

    November 11, 2019 at 6:02 am

    Why do your government invent olympic game to attack Iran. And now its ransomware.

  43. ᎦᏝᎬᎬᏃᎽ

    November 11, 2019 at 6:56 am

    I want to grow up to be a fashion designer if you know what I mean 😉

  44. PEI-CHI LO

    November 11, 2019 at 6:58 am

    Red hat : * confused OS noise *

  45. David Hernandez

    November 11, 2019 at 7:02 am

    Malware I want to a grey-category do you what a grey-category is how to get to that level of decoding?

  46. NeoTokyo

    November 11, 2019 at 7:02 am

    Girl is after my heart. I want a show where she is a badass hacker!

  47. Kitty

    November 11, 2019 at 7:05 am

    0:32 Here is the real answer to that question. A White hat pen test the system with approval, gives feedback to the owner, thus halting the Black hat that is trying to attack the system. A Red hat also aims to stop the black hat, but instead of pen testing their own system, they would attack the black hat instead.

    Yes, Red hat is illegal, which makes sense why cybersecurity experts may not have heard of it. There are only a few legal jobs in the US where it is allowed to do a Red hat job, like Cyberwarfare, for example.

    In short, White and Red hat’s goals is the same, but their way of operation is completely different.

    Hopes this helps.

  48. xxl ebg26

    November 11, 2019 at 7:18 am

    MaC iS eAsY tO uSe, LiNuX iS HaRd

  49. Blan_K

    November 11, 2019 at 7:19 am

    pfff…..penetration tester
    LOL XD

  50. Akhilk 99999

    November 11, 2019 at 7:20 am

    Is she the same Rousseau who is professional in playing piano and make piano covers on youtube with name “Rousseau”

  51. tub3scr3am3r

    November 17, 2019 at 5:48 am

    totally had a different thing in mind regarding “penetration tester”

  52. Kent Celicious

    November 17, 2019 at 7:52 am

    Why tf I’m listening here? I’m a CIVIL ENGINEER

  53. DJ Ceddy

    November 17, 2019 at 9:37 am

    Red hat is a linux hack? lol

  54. Tobias Wozniak

    November 17, 2019 at 10:02 am

    Wow, what a waste of time. Generic and unhelpful answers to authentically curious but unaware questions.
    How proficient are you in your field not making the connection between Red Hat and Linux?

  55. missagaga

    November 17, 2019 at 10:26 am

    I don’t hate C++
    C++ hates me

  56. HalfSlice94

    November 17, 2019 at 11:50 am

    I wanna be a perpetrator tester 🙂

  57. Dollar Hanjabam

    November 17, 2019 at 2:18 pm

    😭😭😭it has been four days since i was attack by mosk virus which is a malware and it has encrypted all my music and Anime collection of about 4tb now all i had to do is format it bc there’s no other way

  58. Ashura Paths

    November 17, 2019 at 2:54 pm

    There is basically no white,grey or black hat. it’s just hacking ethically and unethically

  59. NØFΛCE☿

    November 17, 2019 at 5:09 pm

    came here for information… found my new wife

  60. Oxnyx of The Winter Stars

    November 17, 2019 at 6:19 pm

    Red Hat Linux?

  61. Vergina Simpson

    November 17, 2019 at 6:56 pm

    4:19 doesnt answer the question at all. It’s an answer to a question that wasn’t asked.

  62. François Dillinger

    November 18, 2019 at 12:45 am

    1:04 when a wannabe uses that anonymous mask. CRINGE!

  63. ahri

    November 18, 2019 at 3:52 am

    Every person I know who works in development, engineering, and IT is male (and even my department is full of men — they’re awesome though) but I wish I knew of more women in these fields as a student, I would’ve had more confidence and direction then.

  64. CHIGGA

    November 18, 2019 at 5:19 am

    wonder whos been her bf

  65. Weebmaster 64

    November 18, 2019 at 8:42 am

    Omg,is she rousseau?

  66. shawolmblft

    November 18, 2019 at 12:49 pm

    I want to be her

  67. ReedError

    November 18, 2019 at 7:37 pm

    The NHS are finally getting with the times. They have committed to phasing out fax machines in 2020.
    [not a joke – ]

  68. slaywee

    November 18, 2019 at 9:19 pm

    “why go to gym when you gona die?” wtf that suppose to mean? you dont go to gym so you live longer. Poor choice of words you could use “why eat when you gona be hungry again” or something different.

  69. Static rain

    November 18, 2019 at 11:49 pm

    i wanna be her penetration tester

  70. Steven I.

    November 19, 2019 at 12:01 am

    Hacker Level: Default Router Password

  71. leosedf

    November 19, 2019 at 1:53 am

    Cybersecurity expert LOL. This woman probably cannot cook her own food let alone security.

  72. neil

    November 19, 2019 at 6:15 am

    She’s the prime example of why it’s so easy to hack… she doesn’t even know what “red hat” means??? Wow, please hire more like her, makes what I do so much easier. 😂

  73. JJ Bonneville

    November 19, 2019 at 12:27 pm

    why can’t we send back; hackers crap?

  74. JJ Bonneville

    November 19, 2019 at 12:31 pm

    hackers, the vile scum they are- where? so we can bear them up with guns;and old school baseball bats?

  75. JJ Bonneville

    November 19, 2019 at 12:33 pm

    Twitter sucks

Leave a Reply

Cancel reply

Your email address will not be published. Required fields are marked *

Entertainment

IVE Answer the Web’s Most Searched Questions | WIRED

IVE take the WIRED Autocomplete Interview and answer the internet’s most searched questions about themselves. What does IVE mean? When is Yu-jin’s variety show coming? Will they be touring in the US soon? Yu-jin, Gaeul, Rei, Wonyoung, Liz, and Leeseo answer all these questions and much more! Still haven’t subscribed to WIRED on YouTube? ►►…

Published

on

IVE take the WIRED Autocomplete Interview and answer the internet’s most searched questions about themselves. What does IVE mean? When is Yu-jin’s variety show coming? Will they be touring in the US soon? Yu-jin, Gaeul, Rei, Wonyoung, Liz, and Leeseo answer all these questions and much more!

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Idris Elba Answers The Web’s Most Searched Questions | WIRED

Idris Elba joins WIRED to answer his most searched questions from Google. What are all the different iterations of his DJ names? What football team does he support? How did he get invited on ‘The Office?’ The actor answers all these questions and more! Director: Jackie Phillips Director of Photography: Dominik Czaczyk Editor: Louville Moore…

Published

on

Idris Elba joins WIRED to answer his most searched questions from Google. What are all the different iterations of his DJ names? What football team does he support? How did he get invited on ‘The Office?’ The actor answers all these questions and more!

Director: Jackie Phillips
Director of Photography: Dominik Czaczyk
Editor: Louville Moore
Talent: Idris Elba
Creative Producer: Justin Wolfson
Line Producer: Joseph Buscemi
Associate Producer: Paul Gulyas; Brandon White
Production Manager: Peter Brunette
Production & Equipment Manager: Kevin Balash
Talent Booker: Lauren Mendoza
Camera Operator: Shay Eberle-Gunst
Sound Mixer: Kari Barber
Production Assistant: Lauren Boucher; Brock Spitaels
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Assistant Editor: Fynn Lithgow

00:00 Idris Elba’s Autocomplete Interview

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Science & Technology

Survivalist Answers Survival Questions From Twitter | Tech Support | WIRED

Survivalist Donny Dust answers your questions about primitive skills and surviving in the wild from Twitter. How do you start a campfire without any matches? If igloos are made of ice, how do they keep you warm? What is the most nutritious insect to eat? What does it mean to die by exposure? Answers to…

Published

on

Survivalist Donny Dust answers your questions about primitive skills and surviving in the wild from Twitter. How do you start a campfire without any matches? If igloos are made of ice, how do they keep you warm? What is the most nutritious insect to eat? What does it mean to die by exposure? Answers to these questions and many more await—it’s Survivalist Support.

Check out Donny Dust’s new book, Wild Wisdom, and pick up a copy at

Director: Justin Wolfson
Director of Photography: Josh Bane
Editor: Cory Stevens
Expert: Donny Dust
Line Producer: Joseph Buscemi
Associate Producer: Brandon White
Production Manager: Peter Brunette
Production & Equipment Manager: Kevin Balash
Casting Producer: Nicholas Sawyer
Camera Operator: Freddie Ochoa
Sound Mixer: Carlos Hernandez
Production Assistant: Chloe Smith
Post Production Supervisor: Christian Olguin
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Jason Malizia
Assistant Editor: Billy Ward

00:00 Survivalist Support
00:13 Drinking Urine
00:32 No Compass
01:45 Die By Exposure
02:12 How to Make a Knife
03:49 Dental Hygiene
04:41 No Matches, No Lighter
07:07 Beaver Fever
07:36 Grizzly Attack
08:53 4 Types of Knots
10:18 Most Nutritious Insect
11:00 Sharpening Machetes
11:25 Core Four
12:43 Lake Water
13:35 Cleaning Clothes
14:41 Treating Injuries
15:30 Hunting Rabbit
17:00 LifeStraws
17:26 Fish Trap
18:28 Falling Through Ice
19:34 Igloos
20:35 Natural Shelters
21:08 Combatting Loneliness
21:47 Vegetarian Survivalist
22:34 Safest Game
23:06 Only One Item?
23:33 Lost on a Hike

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending