Our Blog: Stuff we think you should know

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:

https://www.youtube.com/watch?v=A1xkXhYJKQ4

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and Haber Group’s IT experts can help. Call us today at 866.625.3560 to get started learning how to protect yourself against today’s most powerful hacks.

Are You Backing Up All the Data You Need?
Tip of the Week: How to Hide Yourself from Skype
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Productivity Microsoft Network Security Google Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Smartphone Data Ransomware Backup Windows 10 Hardware Android IT Support Productivity Microsoft Office Saving Money Workplace Tips Data Management Managed IT Services Cloud Computing Browser Business Continuity Data Recovery Managed IT Services Gmail Windows Data Backup Facebook Server Innovation Upgrade Internet of Things Outsourced IT Windows 10 Passwords App Office 365 Users Phishing Smartphones Disaster Recovery Word VoIP Employer-Employee Relationship Artificial Intelligence Mobile Device Encryption Chrome Vulnerability Cybersecurity Business Management communications Social Media Remote Monitoring Managed Service Provider IT Support Applications Money Office Tips Network Managed Service Tip of the week Hacker Content Filtering Information Spam Government Big Data Website Miscellaneous BYOD Apple Infrastructure Analytics Display Firewall IT Management Virtual Reality Customer Service Maintenance WiFi Employee-Employer Relationship Robot Avoiding Downtime Paperless Office Printing The Internet of Things Automation Tablet Settings Two-factor Authentication Antivirus Bandwidth YouTube Save Money Risk Management Access Control Router Wireless Data storage Touchscreen Hacking Customer Relationship Management Wi-Fi Business Intelligence Telephone Systems Outlook Laptop Mobile Security Monitors Augmented Reality Company Culture Presentation Quick Tips Safety Scam SaaS Office Operating System Downtime Gadgets Wireless Technology End of Support Recovery Computing Hosted Solution Virtualization Networking Unified Threat Management Password Development Holiday Google Drive Mouse Vendor Management VPN Data Security Chromebook Search Education LiFi Data loss Business Technology Computers HIPAA IBM Virtual Private Network Apps Storage Retail Administration Server Management Document Management Mobile Device Management File Sharing Public Speaking Virtual Desktop SharePoint Voice over Internet Protocol Entertainment Computer Care Legal Mail Merge Title II Desktop Connectivity Samsung Drones Disaster Shortcut Managed IT Service Spying Modem Competition Alt Codes Dark Data Buisness Unified Threat Management Licensing Shortcuts Going Green Social Engineering IT solutions Statistics Specifications Analysis Compliance Websites Identity Theft Lithium-ion battery Spyware Optimization Superfish Streaming Value Social Downloads FinTech IT Technicians iOS Training Address Online Troubleshooting IoT User Error Cooperation Security Cameras G Suite Uninterrupted Power Supply Patch Management Break Fix Cookies Automobile Typing 5G Cortana Bluetooth Black Friday Regulations Undo Deep Learning Humor Halloween Recycling Hotspot Human Error Professional Services Hacks Fun Multi-Factor Security MSP Mirgation Scalability Marketing Corporate Profile Microsoft Excel Star Wars VoIP Managing Stress Staff Managed Services Application Budget Solid State Drive Dark Web PowerPoint Nanotechnology Cryptocurrency Remote Computing How To Cyber Monday Social Networking Bring Your Own Device sip Scary Stories How To eWaste Language Device USB Update IT service Heating/Cooling Google Calendar Chatbots Migration IP Address Cybercrime WannaCry Blockchain LED Cost Management Network Congestion Time Management Printer Cables Wearable Technology Laptops Hard Disk Drive Net Neutrality Onboarding Screen Reader Bitcoin Information Technology Knowledge Cabling Smart Technology Slack Motherboard Digital Payment Best Practice telephony Sports Firefox Continuity Computing Infrastructure Mobility Dongle Writing BDR Servers Legislation Charging Identity Politics Hard Drives Google Docs Mobile Office Smart Office Permissions Co-Managed IT Assessment Windows 8 Network Management Wires Software as a Service FCC Digital Signage Smart Tech Collaboration Google Wallet Experience Unified Communications Managed IT Distributed Denial of Service Monitoring Business Growth Solar Techology Alerts Print Toner Service Level Agreement User Current Events Google Maps Comparison Messaging Tech Support Refrigeration Running Cable Digital Work Lenovo Fraud Content Internet Exlporer Work/Life Balance Electronic Medical Records 3D Printing Error Black Market Point of Sale Travel Law Enforcement Notifications Unsupported Software Twitter Botnet Supercomputer CrashOverride Motion Sickness Gadget Staffing Printers Crowdsourcing Taxes Mobile Data Personal Information Administrator Web Server Machine Learning IT Budget GPS Emergency IT Consultant Computer Repair Processors Cameras Relocation Meetings Mobile Computing Windows 7 Tracking Cleaning Physical Security Health Domains Alert CCTV Upgrades Private Cloud Emoji Webcam Regulation