Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED

WIRED
7 Nov 201911:29

Summary

TLDRIn 'Hacking Support,' Amanda Rousseau, aka @malwareunicorn, tackles common cybersecurity questions with wit and expertise. She dispels myths about hackers' omniscience, explains the roles of white, black, and gray hat hackers, and offers advice for aspiring pen testers. Rousseau also addresses malware trends, the motivations behind hacking, and the importance of security in IoT devices. With a blend of humor and insight, she provides a unique perspective on the ever-evolving world of cybersecurity.

Takeaways

  • 🔒 Passwords remain essential for protecting personal information online, despite the common belief that hackers know everything about us.
  • 🐇 The terms 'white hat' and 'black hat' describe the intentions of hackers, with white hats working for good and black hats being cyber-criminals. 'Gray hats' operate in a moral gray area.
  • 📚 Becoming a penetration tester involves learning through courses, workshops, events, and finding mentors within the cybersecurity field.
  • 💾 Malware primarily targets money, with victims often being collateral damage in a broader attack strategy.
  • 📈 Malware trends evolve like fashion, with different types emerging periodically and security professionals needing to stay updated.
  • 🎯 Hackers target individuals or organizations for various reasons, including financial gain, reputation, information, or destruction.
  • đŸš« The complexity of student loan aid login processes is to deter hackers from accessing and manipulating accounts, not to assist them.
  • đŸ€– Bot accounts on social media perform 'account aging' to avoid detection by simulating legitimate user behavior.
  • 🏠 IoT devices often have security as an afterthought, leading to ongoing vulnerabilities that hackers can exploit.
  • 🛠 Debugging is a skill best learned through hands-on experience and practice, similar to learning to ride a bike.
  • 🎹 A background in graphic design can enhance the ability to communicate complex cybersecurity concepts visually.
  • 🎭 The portrayal of hackers in stock images as wearing ski masks and hoodies is a stereotype that doesn't reflect the reality of the profession.

Q & A

  • What is Amanda Rousseau's profession and Twitter handle?

    -Amanda Rousseau is an offensive security engineer, and her Twitter handle is @malwareunicorn.

  • Why does Amanda suggest that passwords are still necessary despite the prevalence of hacking?

    -Amanda suggests that passwords are necessary because hackers don't actually know everything about everyone; it depends on the information individuals put out on the internet.

  • What is the difference between a white hat hacker and a black hat hacker according to the script?

    -A white hat hacker hacks for good, often working in the security industry, while a black hat hacker refers to cyber-criminals.

  • What does Amanda describe as the purpose of malware?

    -Amanda describes the purpose of malware as typically going after money, with victims often being considered collateral damage.

  • How does Amanda suggest one can begin learning to excel in the field of penetration testing?

    -Amanda suggests that one can start by finding content online such as courses, workshops, and attending events and conferences to meet others in the field and find a mentor.

  • What does Amanda mean by 'account aging' in the context of bot accounts on social media?

    -Account aging refers to the process where bot accounts perform minimal actions to avoid detection by social media platforms, making them appear more like legitimate accounts.

  • Why does Amanda believe that IoT devices will continue to have security issues?

    -Amanda believes that IoT devices will continue to have security issues because they are often developed with the lowest possible cost of manufacturing in mind, making security an afterthought.

  • What is the first step Amanda recommends for someone looking to start debugging?

    -Amanda recommends jumping right in and practicing, comparing it to learning to ride a bike, where it takes time and practice to get it right.

  • How does Amanda respond to the question about changing job titles in a company profile?

    -Amanda humorously suggests naming oneself 'Safe for Work' in response to the user's request for a job title that is obviously safe for work.

  • What is Amanda's view on the use of embedded cameras in smart TVs and video streaming apps?

    -Amanda informs that the misuse of embedded cameras has been happening for several years already, implying that it's not a new concern.

  • Why does Amanda say that hackers are not likely to pay off someone's student loans if they were to break into their account?

    -Amanda explains that hackers are more likely to use the system for their own gain, such as paying off their own tuition, rather than paying off someone else's debt.

Outlines

00:00

🔒 Passwords and the Role of Hackers

Amanda Rousseau, known as @malwareunicorn, introduces herself as an offensive security engineer and discusses the necessity of passwords despite the prevalence of hacking. She clarifies the difference between white hat (ethical) hackers and black hat (criminal) hackers, and introduces the concept of gray hat hackers. Amanda also addresses the question of how to start a career in penetration testing, suggesting resources like courses, workshops, events, and finding mentors in the field. She touches on the purpose of malware, which is often financial, and compares it to a fashion trend that evolves over time.

05:01

🎯 Hacking Motivations and Cybersecurity Measures

The script continues with a discussion on why hackers target certain individuals, such as celebrities, and the various motivations behind hacking, including financial gain, reputation, information gathering, and destruction. Amanda also addresses the complexity of the login process for sensitive accounts like student loans, explaining that security measures are designed to prevent unauthorized access, not to facilitate it. She then talks about the purpose of bot accounts on social media, explaining that they are used for account aging to avoid detection by automated systems. The paragraph concludes with a reflection on the persistence of security vulnerabilities in IoT devices due to cost-cutting measures in manufacturing.

10:02

đŸ‘©â€đŸ’» Cybersecurity Careers and Hacking Misconceptions

Amanda responds to questions about her choice of using a Mac for security work, drawing parallels between Mac and Linux, and noting that there is less malware targeting these systems compared to Windows. She discusses the ineffectiveness of spam emails from a criminal perspective, explaining how even a small percentage of successful targets can be lucrative. The paragraph also includes her experience in creating visual content for incident timelines, leveraging her background in graphic design. Amanda addresses the difference between phishing and bad pick-up lines, emphasizing the effectiveness of the former. She also discusses the WannaCry ransomware attack on the NHS, highlighting the challenges of upgrading critical infrastructure without causing downtime.

đŸ€ Encouraging Youth in Cybersecurity

In the final paragraph, Amanda reflects on how she became aware of a career in cybersecurity and the importance of exposing young people to such opportunities. She emphasizes the hacker mentality of creative problem-solving and thinking outside the box, suggesting that this mindset could be fostered in young people through workshops and content that challenges them to solve unconventional problems. The script ends with a humorous note on the stereotypes of hackers wearing ski masks and hoodies, which Amanda playfully adopts as part of her persona.

Mindmap

Keywords

💡Offensive Security Engineer

An offensive security engineer is a professional who specializes in ethical hacking, which involves identifying and exploiting vulnerabilities in systems to enhance their security. In the video, Amanda Rousseau, who uses the alias @malwareunicorn, identifies herself as an offensive security engineer, indicating her role in proactively understanding and mitigating security threats.

💡Hacking

Hacking refers to the practice of exploiting vulnerabilities in computer systems to gain unauthorized access or control. In the script, hacking is discussed in various contexts, such as the difference between white hat (ethical) and black hat (malicious) hackers, and the role of hacking in security testing and education.

💡White Hat Hacker

A white hat hacker is an ethical hacker who uses their skills to identify and fix security vulnerabilities in systems with permission. The term is used in the script to describe individuals in the security industry who work to improve system defenses and is contrasted with black hat hackers who engage in malicious activities.

💡Black Hat Hacker

A black hat hacker is a cybercriminal who uses hacking skills for malicious purposes, such as stealing data or causing damage to systems. In the video, Amanda clarifies the difference between black hat hackers and white hat hackers, emphasizing the ethical considerations in the hacking community.

💡Gray Hat Hacker

A gray hat hacker is an individual who operates in a legal gray area, sometimes finding and exploiting vulnerabilities without explicit permission but not necessarily intending to cause harm. The script mentions this term to illustrate the spectrum of hacker motivations and behaviors.

💡Penetration Tester

A penetration tester, or pen tester, is a professional who simulates cyber attacks on systems to identify vulnerabilities. In the script, Amanda discusses the role of a pen tester and offers advice on how to become one, emphasizing the importance of learning and networking within the field.

💡Malware

Malware, short for malicious software, is any software used to disrupt, damage, or gain unauthorized access to a computer system. The script discusses the purpose of malware, which is often financial gain, and likens the evolution of malware to a fashion trend, indicating its constant change and adaptation.

💡Cyber-Criminal

A cyber-criminal is an individual who uses digital technology to commit crimes, such as identity theft, online fraud, or spreading malware. The term is used in the script to describe those who engage in harmful hacking activities for personal gain or other nefarious purposes.

💡IoT Devices

IoT, or the Internet of Things, refers to the network of physical devices, vehicles, and other items embedded with sensors and software that enable them to connect and exchange data. The script mentions IoT devices in the context of security vulnerabilities due to the prioritization of cost reduction over security during manufacturing.

💡Phishing

Phishing is a type of online scam where attackers attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising themselves as a trustworthy entity. The script compares phishing to pickup lines, noting the low effort and potential for success in deceiving targets.

💡Red Team and Blue Team

In cybersecurity, red and blue teams represent opposing forces in simulated exercises. The red team acts as the attackers, while the blue team defends the systems. The script explains the purpose of these teams as a way to identify and fix security holes before they can be exploited by actual cyber-criminals.

Highlights

Amanda Rousseau, aka @malwareunicorn, introduces herself as an offensive security engineer and the host of Hacking Support.

Discusses the misconception that hackers know everything about everyone and emphasizes the importance of not sharing personal information online.

Explains the difference between white hat and black hat hackers, with white hats hacking for good and black hats being cyber-criminals.

Introduces the term 'gray hat' for hackers who may act as IT admins by day and engage in malicious activities by night.

Advises on how to become a penetration tester, suggesting courses, workshops, events, and finding a mentor in the field.

Describes malware as usually targeting money and considering victims as collateral damage.

Compares the evolution of malware to a fashion trend, with different types emerging seasonally.

Explains the motivations behind hacking, including money, reputation, information, and destruction.

Addresses the complexity of the student loan aid login process as a security measure against hackers.

Clarifies the purpose of bot accounts on social media, which is to bypass automated detection systems through account aging.

Discusses the security vulnerabilities in IoT devices due to the focus on low manufacturing costs.

Advocates for jumping right into debugging as the best way to learn, comparing it to learning to ride a bike.

Suggests naming a job title 'Safe for Work' in response to a Twitter user's question about changing their job title.

Warns that smart TVs and video streaming apps have been collecting and sharing data, with embedded cameras potentially being misused.

Responds humorously to a question about C#, stating that C# hates her, not the other way around.

Refutes the idea that hackers would leak Taylor Swift's private recordings, referencing her alter ego @SwiftOnSecurity.

Differentiates between the terms 'hacker' and 'cyber-criminal', preferring to call malicious actors cyber-criminals.

Answers a question about using a Mac for security work, comparing it to Linux and noting the relative lack of Mac-targeted malware.

Explains the purpose of spam emails, which is to profit from a small percentage of targets who respond to the scams.

Shares her background in graphic design and its influence on her work in computer science, including creating 3D videos for network layouts.

Compares phishing to bad pickup lines, arguing that phishing is more effective due to its potential for financial gain.

Discusses the WannaCry ransomware attack on the NHS, attributing it to a lack of system upgrades.

Describes the roles of red and blue teams in cybersecurity, with red teams finding vulnerabilities and blue teams defending systems.

Advocates for introducing hacking as a career at career fairs to inspire young people to enter the cybersecurity field.

Humorously addresses the stereotype of hackers wearing ski masks and hoodies, suggesting it's for warmth and to avoid identification.

Concludes the episode of Hacking Support with a reminder for viewers to stay safe.

Transcripts

play00:00

- Hi, I'm Amanda Rousseau aka @malwareunicorn

play00:03

and I'm an offensive security engineer

play00:05

and this is Hacking Support.

play00:06

[dramatic music]

play00:08

[keyboard clicking] [dramatic music]

play00:10

This Twitter user, @cloud_opinion, asks,

play00:12

"At this point, hackers know everything

play00:14

"there is to know about every one of us.

play00:16

"Why do we need passwords now?"

play00:19

Why keep going to the gym if you're gonna die anyways?

play00:21

Passwords are kind of a necessary evil.

play00:23

And hackers really don't know everything about you.

play00:25

It all depends if you put that

play00:27

information out there on the internet.

play00:28

"Congrats.

play00:29

"I know what a white hat is, I know what a black hat is.

play00:32

"What is a red hat?

play00:33

"Angry hacker?"

play00:34

I don't think I've heard the term red hat hacker before.

play00:37

When you're a white hat hacker, you hack for good.

play00:40

A lotta people in the security industry

play00:42

are white hat hackers.

play00:43

And then, for the cyber-criminals, we call them black hats.

play00:47

There's also this other term called a gray hat

play00:50

where they could be a IT admin during the day

play00:53

while moonlight as a black hat during the night.

play00:56

[mouse clicking]

play00:57

@hacker4life asks, "@malwareunicorn, how do you even begin

play01:00

"learning and exceeding in this field?

play01:02

"I'm trying to become a

play01:03

"penetration tester and need inspiration."

play01:05

So, a pen tester is kind of like an attacker

play01:08

that goes and checks all of the external ports,

play01:12

any openings within someone's network.

play01:14

But if you really wanna be a penetration tester,

play01:17

there's a lot of content out on the web right now.

play01:19

Courses, workshops, they even have events and conferences

play01:23

where you can meet other people in the field.

play01:25

You can find a mentor, learn from them.

play01:28

They would point you in the right direction.

play01:30

I feel like the hacker culture is pretty open and diverse,

play01:35

so there's a lotta content out there.

play01:37

[mouse clicking]

play01:38

"Malware's the worst.

play01:38

"What is its purpose other than wasting my time?"

play01:40

Usually, malware is going after money.

play01:42

And, if anything, you're considered collateral damage.

play01:45

When malware is delivered, they're usually

play01:48

just spraying all the malware to many people as possible,

play01:51

so it may not be intended for you.

play01:53

I think of malware as a fashion trend.

play01:55

You know, there's different malware

play01:56

every season, every quarter, and you have to

play01:58

stay in fashion and on trend all the time.

play02:01

When you think about older malware

play02:02

that used to occur a couple years ago,

play02:04

sometimes it comes back in fashion.

play02:06

[mouse clicking]

play02:07

This twitter user, @naima, asks,

play02:08

"Jessica Alba is an interesting choice for hacking.

play02:10

"How do hackers decide who they're going to target?"

play02:13

Jessica Alba's a beautiful woman and she's also a celebrity,

play02:16

so she sounds like a great, shiny object

play02:19

for cyber-criminals to go after,

play02:20

but a lot of them have different motivations.

play02:22

It could include money, is probably the biggest one.

play02:25

Another one would be reputation.

play02:28

They would be like, "Ha ha, I hacked this person."

play02:29

It could be information, kind of like corporate espionage,

play02:33

and then we have destruction, which is kind of rare.

play02:35

Basically what it is, they try to destroy

play02:37

all the systems to put that company out of business.

play02:39

[mouse clicking]

play02:40

@KyleeMinaj asks, "Why do they make the login process

play02:43

"for your student loan aid so difficult and tedious?

play02:46

"If some hackers want to break into my account

play02:48

"and pay off all my student loans,

play02:50

"please don't make it difficult for them.

play02:52

"Y'all are gonna ruin this for me.

play02:53

"Let them run wild in there."

play02:55

Kylee, these hackers are not gonna go and pay off your debt.

play02:59

If anything, they're gonna go

play03:01

into the system to pay off their tuition,

play03:03

so a lot of these controls are in place

play03:05

to hinder hackers like that to get into your account.

play03:09

It's an unfortunate thing to do

play03:10

but, you know, it's necessary.

play03:12

[mouse clicking]

play03:13

@AxelBlazen asks, "Speaking of [beep],

play03:14

"what is even the point of these bot accounts

play03:16

"that follow you but, well, that's it.

play03:18

"No messaging or anything, no spam, just follow.

play03:21

"Like [beep] sake, it's dumb."

play03:23

Well, these accounts are doing something

play03:25

that may not pertain to you, what we call account aging.

play03:30

So what that means is they're trying to

play03:32

bypass a lot of automated detections from social media

play03:36

that they have in place to look for fake accounts.

play03:40

And so, by tweeting or messaging

play03:42

or making any type of action,

play03:44

they're trying to bypass detection

play03:46

to look more like a legitimate account.

play03:48

[mouse clicking]

play03:49

This Twitter user, @andrewcheeky, asks,

play03:50

"What will they think of next?

play03:51

"Is there anything that has been corded in the last decade

play03:54

"that hackers haven't found

play03:55

"a vulnerability to do some damage?"

play03:57

If you think about your fridge at home

play03:59

being able to connect to the WiFi or your pressure cooker

play04:02

being able to connect to an app on your phone,

play04:04

a lot of these devices are developed

play04:07

in a way where they're looking for

play04:09

the lowest possible cost of manufacturing,

play04:12

so when they get to the security part,

play04:14

it's kind of like an afterthought,

play04:16

so until things change, we're gonna

play04:18

still have these problems with IoT devices.

play04:21

[mouse clicking]

play04:21

Twitter user @sifbaksh: "@malwareunicorn,

play04:24

"what should my first step be in debugging?

play04:26

"Should I just get a file and a book and start doing?"

play04:28

The best way is to just jump right in.

play04:30

Think about it as riding a bike.

play04:33

It takes time, it takes practice,

play04:35

but eventually, you'll get it.

play04:36

There's a different debugger for every operating system

play04:39

but they're not easy to learn unless you start, you know,

play04:42

just doing it yourself and training yourself and practicing.

play04:46

Like, I don't remember every single command in a debugger.

play04:48

I have to use a cheat sheet.

play04:50

[mouse clicking]

play04:51

Twitter user @stormwuff_: "My awesome boss says that

play04:53

"I can request to change my job title

play04:55

"to whatever I want it to be

play04:56

"in our company profile [obviously safe for work].

play04:59

"Could anything random like

play05:00

"Pokemon Hacker or Cybersecurity Wizard.

play05:03

"What do you guys think it should be?"

play05:04

Well, I can see you just said, "Obviously safe for work,"

play05:08

so I think you should just name yourself Safe for Work.

play05:10

[mouse clicking]

play05:11

This Twitter user, @SuB8u, asks, "Your smart TV

play05:14

"and your video streaming apps are collecting and sharing

play05:17

"tons of data, just because they can.

play05:19

"How long before we can start having embedded cameras

play05:21

"that malware triggers surreptitiously?"

play05:24

I have unfortunate news for you.

play05:26

This has been happening minus six years

play05:28

and it's gonna continue to happen, so too late for you."

play05:31

[mouse clicking]

play05:32

@Alessan82718685, that's a mouthful: "Why do you hate C#?"

play05:38

Man, his handle looks like a bot. [laughs]

play05:40

I don't hate C#, C# hates me.

play05:43

[mouse clicking]

play05:44

@theonlyoneofyou asks, "Why can't hackers do anything useful

play05:47

"like leak Taylor's recordings of Babe and Better Man?

play05:50

"Grow up, hackers."

play05:52

Well, if you don't already know, Taylor Swift has

play05:54

an alter ego that we call @SwiftOnSecurity

play05:57

and she's considered a security pro

play05:59

in the cybersecurity industry,

play06:01

so no one actually wants to hack her.

play06:03

But if you're in the know and you know

play06:05

who that is, then you know who it is.

play06:07

[mouse clicking]

play06:08

This Twitter user, @zer0wn asks, "Can we stop calling

play06:10

"people who DDoS [beep] hackers?

play06:12

"Journos, why the hell do you even

play06:13

"call them hackers to begin with?

play06:15

"Looking for legitimate answers as I am confused as hell."

play06:18

Well, let me set the record straight.

play06:19

There's a difference between hacker and a cyber-criminal,

play06:23

so if we were to refer to the bad guys,

play06:25

I would rather prefer to call them a cyber-criminal.

play06:28

There's a lotta people in the security industry

play06:30

that consider themselves hackers.

play06:32

There's a lotta people that hack for good.

play06:33

@WMRamadan asks, "@malwareunicorn,

play06:36

"I have a simple yet daunting question.

play06:38

"Why do you use a Mac for your security work?

play06:41

"I mean, a lot of people argue the fact

play06:43

"that Linux is the way to go in terms of security."

play06:45

Mac is similar to Linux.

play06:47

Think about two different brands of cars.

play06:50

They look different on the outside

play06:51

but they could be sharing the same chassis underneath.

play06:54

There's not a lotta malware out there for Mac and Linux.

play06:58

I mean, it's there, but, you know,

play07:00

currently most of the malware is on Windows.

play07:02

[mouse clicking]

play07:03

The Bishop, or @JoshHarris25:

play07:05

"What is the point of spam emails?

play07:07

"Are they profiting from it?

play07:08

"What do they gain from spending random unnecessary emails?"

play07:11

When people send out spam emails,

play07:14

they're sending it to thousands and thousands of targets.

play07:17

Say you had a million emails sent out

play07:21

and they're requesting $1.

play07:23

These cyber-criminals are expecting

play07:24

that 1% will actually bite.

play07:27

A lotta these cyber-criminals will treat this as a business,

play07:30

so it becomes very lucrative for them.

play07:32

@Cybor_Tooth: "@malwareunicorn, if you were to

play07:34

"create a timeline for an incident, what would it look like?

play07:38

"Just curious because your design skills are cray cray."

play07:41

Well, a lotta people don't know this,

play07:42

but before I got into computer science,

play07:45

I was actually pursuing a degree in graphic design,

play07:47

so a lot of it, from my time doing that,

play07:51

carries over into my work.

play07:52

Back when I used to work at the Department of Defense,

play07:54

I used to create these 3D videos

play07:57

to describe different type of network layouts.

play08:00

I didn't know 3D design at the time,

play08:02

so I spent a weekend, taught myself,

play08:05

and the next day, started, you know, making content.

play08:08

If you can make things look nice and be able to

play08:11

communicate the actual abstract content, it helps.

play08:15

[mouse clicking]

play08:15

@dontlook asked, "Yeah, but bad pick up lines

play08:18

"and phishing really any different?

play08:20

"Low effort, easy reuse, and rarely do you get a success."

play08:23

I really think phishing is more effective

play08:26

than saying a pickup line.

play08:28

@ivladdalvi: "I studied WannaCry case in NHS hospital.

play08:33

"A disaster seemed totally preventable.

play08:35

"Why didn't they patch?

play08:36

"Were they lazy? Stupid?"

play08:38

In the case of this incident, a hospital

play08:41

in the UK was under a ransomware attack.

play08:44

It happened because they didn't

play08:45

upgrade their servers or their computers.

play08:48

And this is the whole reason

play08:49

why upgrading is really important,

play08:52

but when you think about it, some of these infrastructures

play08:55

like a hospital or a power plant,

play08:58

a lot of 'em cannot experience any downtime.

play09:01

So when you do do an upgrade, you have to

play09:03

shut down the systems for a little while.

play09:05

[mouse clicking]

play09:06

@Tyro733 asks, "As someone who doesn't work in Infosec,

play09:09

"what are red and blue team?

play09:11

"I'm assuming red are the pen testers."

play09:13

These terms actually come from the military

play09:17

where they would perform military operations,

play09:19

they have a team that acts as a red team doing the attacks

play09:23

and the blue team serves as the defense team.

play09:25

Similar to what we have in cybersecurity in that

play09:28

the red team is hacking the blue team's systems.

play09:33

The whole point of what the red team does

play09:35

is to enumerate holes within a network.

play09:37

We wanna find the holes before the bad actors do.

play09:40

Think of it like we're sparring partners.

play09:43

So, we're really not there to antagonize the blue team

play09:45

or anything like that, we really wanna

play09:47

work together with the blue team.

play09:49

[mouse clicking]

play09:49

@r00tzasylum: "Hacker kid interviewed his mom

play09:52

"about what it's like to build a career in Infosec.

play09:54

"Something @defcon parents often think about:

play09:56

"how do we inspire kids to go into this space

play09:59

"and see it for the fun and challenge that it is?"

play10:02

Well, when I was young, I had no idea

play10:04

I was gonna be in this job.

play10:05

I actually had to know that this job existed

play10:07

in order to actually go into it.

play10:09

If there was a chance that, at a career fair,

play10:11

you would have someone who gets to hack for living,

play10:15

I think that would be a really cool thing to have.

play10:18

You have to have the correct

play10:19

mentality to be in this industry.

play10:21

The whole hacker mentality is

play10:23

creatively thinking outside the box,

play10:25

solving a problem that's out of the standards

play10:28

or norms of how it's supposed to execute.

play10:30

If we kind of use that type of mentality

play10:33

in some of the content or workshops

play10:36

or anything that we reach out to these kids with,

play10:40

it'll kind of inspire them to

play10:42

wanna solve problems in this field.

play10:44

[mouse clicking]

play10:45

This Twitter user, @Arfness, asks,

play10:46

"Why do stock image hackers

play10:47

"exclusively wear ski masks and hoodies?"

play10:50

Well, I think the photographer was going for

play10:52

a feel of an actual robber or a criminal,

play10:54

but there is a reason to wear something on your face.

play10:57

They're trying to hide their face

play10:58

from cameras or any type of identifier

play11:00

that will attribute them to a crime.

play11:02

And why they're wearing hoodies,

play11:03

I can imagine that some of these server rooms are super cold

play11:06

and they need to cover their ears.

play11:07

[mouse clicking]

play11:08

If you don't already know, you know,

play11:10

some of us actually dress like this to work

play11:12

and I actually have a ski mask for all of my outfits.

play11:15

Lemme put it on for you guys.

play11:17

And it's not complete without the glasses.

play11:21

We're good to go, it's time to hack.

play11:22

[keyboard clicking]

play11:23

This has been Hacking Support with Amanda Rousseau.

play11:26

You guys stay safe out there.

play11:27

[dramatic music]

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityHackingPasswordsMalwareWhite HatBlack HatGray HatPenetration TestingHacker CultureCyber Threats
Besoin d'un résumé en anglais ?