Advertisement

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED Facebook Offensive Security Engineer Amanda Rousseau aka "Malware Unicorn" uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as a red hat hacker? What's the point of malware, is it just to be annoying? Are people who start DDoS attacks actually hackers? Amanda answers all these Twitter questions, and much more!



Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

Still haven’t subscribed to WIRED on YouTube? ►►

Get more incredible stories on science and tech with our daily newsletter:



Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Tradecraft.



ABOUT WIRED

WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture.

Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at:

hacker,hacking,amanda rousseau,malware unicorn,malware unicorn hacker,amanda rousseau hacker,offensive security engineer,security,internet security,hacking support,hacker explains,hacker answers twitter questions,hacker answers questions,hacker wired,wired hacker,wired hacking,white hat,black hat,infosec,information security,web security,tech support,hacking tech support,tech support hacking,info security,wired,

Post a Comment

0 Comments