Our Blog: Stuff we think you should know

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:

https://www.youtube.com/watch?v=A1xkXhYJKQ4

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and Haber Group’s IT experts can help. Call us today at 866.625.3560 to get started learning how to protect yourself against today’s most powerful hacks.

Are You Backing Up All the Data You Need?
Tip of the Week: How to Hide Yourself from Skype
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Computer Business Computing Microsoft Hosted Solutions Network Security Productivity Software Google Internet Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Ransomware Workplace Tips Windows 10 Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Facebook Browser Data Recovery Managed IT Services Business Continuity Social Media Data Management Server Users Office 365 Upgrade Phishing Internet of Things Innovation Word Managed IT Services Mobile Device Gmail Windows Data Backup Smartphones Disaster Recovery Outsourced IT Windows 10 App Passwords Network Vulnerability Chrome Cybersecurity Artificial Intelligence Business Management Information Miscellaneous communications Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Encryption IT Support Hacker Gadgets Managed Service Content Filtering Government Money Spam Website Big Data BYOD Applications Infrastructure Save Money Apple Virtual Reality Tip of the week Analytics Office Tips Display Avoiding Downtime Settings Employee-Employer Relationship Antivirus The Internet of Things Two-factor Authentication Virtualization Access Control Bandwidth Robot Printing YouTube Router Automation Education Risk Management Wireless Apps IT Management Firewall Maintenance Augmented Reality Customer Service WiFi Tablet Data storage Paperless Office Safety SaaS Solid State Drive Networking Office Company Culture Downtime Outlook Wireless Technology Recovery Holiday Unified Threat Management Hosted Solution Hard Disk Drive VPN Monitors Data Security HIPAA Data loss Business Technology Operating System Chromebook Development Virtual Private Network Search End of Support Computing Server Management IBM Password Mobile Security Document Management Touchscreen Google Drive Mobile Device Management Mouse Vendor Management Administration Hacking Telephone Systems Customer Relationship Management Wi-Fi LiFi Laptop Quick Tips Computers Scam Business Intelligence Storage Retail Presentation Blockchain Cost Management Halloween Troubleshooting VoIP Legal Undo Google Calendar Chatbots Cortana FinTech iOS How To Drones Marketing Printer Wearable Technology Fun Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader Students WannaCry Going Green Social Engineering Application Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Permissions Assessment Scary Stories Time Management Legislation Identity Update MSP Scalability Social IP Address Cybercrime PowerPoint Firefox Managing Stress Managed Services Cabling Typing FCC Smart Tech Mixed Reality Alerts Service Level Agreement Digital Payment eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Fraud Internet Exlporer Politics Sports LED Network Management Comparison Knowledge Migration Hacks Connectivity Mobile Office Onboarding Techology Budget Hard Drives SharePoint Collaboration Cables Laptops Managed IT Cryptocurrency Title II Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Value Tech Support Smart Office Co-Managed IT Specifications Compliance Experience Unified Communications Charging Mail Merge Online IoT Computer Care Running Cable Digital Signage Unified Threat Management Refrigeration Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion User Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Virtual Desktop Solar Print Toner Statistics Best Practice telephony Public Speaking Break Fix Cookies Samsung Address Writing Hotspot Professional Services Websites Identity Theft Buisness Work Content Google Docs Competition Black Friday Regulations Messaging Microsoft Excel Star Wars Training Lithium-ion battery Desktop User Error Multi-Factor Security Mirgation IT solutions Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite Corporate Profile Current Events Language USB 5G Optimization Streaming Cyber Monday Social Networking Analysis Employee-Employer Relationships Gadget Staffing Motion Sickness Taxes 3D Printing Personal Information Administrator Crowdsourcing Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Domains Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Regulation Law Enforcement Physical Security Travel CrashOverride Upgrades Notifications Botnet Supercomputer Twitter