SlideShare a Scribd company logo
1 of 2
Hacking on and off-screen
Everything you can imagine is real. But is it, really? In the recent years, cybersecurity borders have been largely
outstretched and pop references did not fall much behind. Wait, scratch that. Not only did cinematic producers keep
close tabson the evolutionof technologywiththe dawnof the internet,theyevensometimesfoundthemselvesonthe
brinkof predictingfuture trends(the Internetof Things wastheireasiestguess).Othertimes,let’sjustsaytheyran out
of luck and their imagination wentwaaay overboard. A bit of advice: good fiction doesn’t alwayshave to stray that far
away from the truth.
As more and more blockbustersandTV shows alike venturedinthe ambitiousjourneyof depictingthe mysterious,yet
eversointriguinghackeruniverse,itwastobe expectedthatsome productionswouldperformbetterthanothers. That
beingsaid,thisweek’sarticle takesyouthroughthe Top5 worstcybersecuritycinematicreferences.Itisourconviction
that, perhaps, by showcasing these examples here, this could actually turn out to be an educational post (for some).
#1 The ‘two on a keyboard’ scene
At some pointin time,Hollywoodproducersseemed toall agree that hacking,the complex act of gainingunauthorized
access to data ina systemorcomputer,needstobe fast. Really fast. Asif,if you’re not typingfastenough,the datawill
justrun awayfrom you.The navy cop series NCISshowsyoujusthow heatedsucha cyber-race can get.Not typingfast
enough?Then,byall means,let’stype the bothof us. And thenan infinite amountof windowswillopenonthe screen.
How would that even work?
#2 The ‘I am invincible’ scene
BorisGrishenkoisaRussianhackerportrayedbyScottishactorAlanCumminginthe movie GoldenEye.Onthe one hand,
he is a talented computer hacker, but on the other, he is also a backstabbing,arrogant misogynist.Believing everyone
else is beneath him, he shouts out "I am invincible!" whenever he succeeds. This is one of movie makers’ favorite
stereotype ever: hackers are God with Internet. That is, when they’re not too busy portraying them as nerdy social
outcasts.
#3 The ‘oh, there’s malware’ scene
We getthat everythingontelevisionhasto be simplifiedforthe viewertoquicklygraspthe story,but thisgreencode /
red code scene in CSI: Cyberis justtoo much. As the name so subtly indicates,thisTV seriesisabouttwothings:(1) the
CSI (a team of crime scene investigators) and (2) cybersecurity (or at least, some approximate perception of it). With a
reputationof over-exaggeratingthe capabilitiesof amere hackbasedonisolatedeventssuchasthis one,CSI:Cybersets
the bar at all time lowasit triesalmosttoohard to pinthe tail on the cybersecuritydonkey. Whereasflashinglightsand
special effects are cool and all that, highlighting the malware in red in the middle of a screen filled with green linesof
code is,to put it bluntly,absolutelyridiculous.If it where that easyto detecta malware,thenwhy are we not all using
this magical bi-color solution?
#4 The ‘Deus Ex Machina’ scene
ThisSeptember,the teenagemovie‘Nerve’came out.Whilethe ideaof Internetanonymitywaswellexecuted,once the
maincharacter, Vee,entersthe final stage of the game, the storyline spills all overthe place.Suddenly,Tommy,one of
Vee’s best friends, a rookie-hacker, steps in as the convenient Deus Ex Machina that saves the plot. Tommy suddenly
reveals his connections with an influential hacker group that manages to stop the game (in less that 3 minutes) by
revealing all watchers’ identities. Oh, well. At least the botnet looked pretty.
#5 The ‘kill the virus’ scene
We’ve savedthe bestforlastandit’sdefinitelythe 1995 classic‘Hackers’.Itcrossesof ourlistall the previousclichésand
addsina newone:the video gamedimension.Yes,inthismovie,the kernel isanactual control towerandvirusesare 3D
evil charactersthatgetto be blastedoff withraysof code.Now,we know thatsometimescyber-threatsare soannoying
that nothingwouldgive usmore pleasure thatto destroythem, butthe screenwritersof Hackers mighthave takenthe
word ‘destroy’ too literally.
It becomes clear by this pointinour article that hackingis not a WAMBAM PUFFkind ofactivity. But it’salso obvious
thatnobodywill sitdownfor2 straighthourswatchingsomeonetype,notred,not green,butregular codeona screen.
Hacking can be a painstakinglyslowprocess, yet there are ways that movies and TV series can fit this notionof time
in their plot. One such example and one of our favorites at the moment is, of course, Mr. Robot.
Inspiring real-life hackers to cyber-mischief
“But I'm only a vigilante hacker by night.
By day, just a regular cybersecurity engineer. Employee number ER28-0652”
— Elliot Alderson, about himself
The storystarts withour main character, Elliot,beingrecruitedintoaband of undergroundhackersbyMr. Robot(a.k.a
the group leader).Sufferingfromsocial anxiety,aswell asa drug addiction,what’sinterestingaboutElliotisthe duality
within him. He’s not really able to connect with other people, but he sure knows a lot about them since he, to put it
bluntly, spies on them.
At the confluence between resentment against a superfluous world and the behind-the-scenes peak inside the hacker
universe, here are a few reasons why Mr. Robot makes for a great watch for those cyber-aficionados:
 It’salmosttooreal at times.Andthe reasonitseemsthatwayisbecause,accordingtothe show’screators,the TV
seriesonlyadherestohacks that have alreadyhappenedandthat have beendiligentlystudied.Forinstance,the
way the smart home in S02E01 is depicted was enough to send chills down our spines. There were no flashing
lightsorvideogamesgraphicsinvolved,instead,Mr.Robotreliedon quaint,multipleactionsinordertodrive the
house owner off the edge (blasting the music in the speakers out loud, turning off the thermostat and so on).
 It has a goodtempo.There’sno5-secondshackand that issomethingthatthe cybersecurityexpert communityis
highlyappreciative of.NotonlydoesMr. Robot respectthe accuracy of a certaincyber-attack,butthe showalso
manages to give the impression of tediousness, each new hack being carried out in time.
 There are no stereotypes,justavividawarenessof the humannature.Elliot’sattentiontothe personbehindthe
machine is dauntingandservesas a propellerforhissocial engineeringtechniques.Once again,enterpriseswith
strong securityarchitecturesare compromisednotbecause of applicationvulnerabilities,butbecause of another
type of vulnerability all together – man.
What makesthisproductioninterestinginthe endistheinsightitprovidesintothe psychological profileof ahacker(and
not only).Withthe Season2 finale airing thisweekaroundthe world,Mr.Robot concludesyetanothergreatchapterin
the hacker thriller genre. So much so that it’s inspired it’s very own ransomware, named after the group of hacker
vigilantes led by Mr. Robot himself – fsociety.
Link: https://www.reveelium.com/en/hacking-on-and-off-screen/

More Related Content

Similar to Top 5 Worst Cybersecurity Movie Scenes

Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!Frode Hommedal
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackMSR Buzz
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)Felipe Prado
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Dark web wardrives straight into the bad tech-film toilet
Dark web wardrives straight into the bad tech-film toiletDark web wardrives straight into the bad tech-film toilet
Dark web wardrives straight into the bad tech-film toiletJames P DeVellis
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duckSensePost
 
The Internet's Suite
The Internet's SuiteThe Internet's Suite
The Internet's SuiteDyrim
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Silicon Valley goes to the movies
Silicon Valley goes to the moviesSilicon Valley goes to the movies
Silicon Valley goes to the moviesJeffJedras
 

Similar to Top 5 Worst Cybersecurity Movie Scenes (20)

AI in Film Writing.pdf
AI in Film Writing.pdfAI in Film Writing.pdf
AI in Film Writing.pdf
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
MiraiBotnet.pptx
MiraiBotnet.pptxMiraiBotnet.pptx
MiraiBotnet.pptx
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Dark web wardrives straight into the bad tech-film toilet
Dark web wardrives straight into the bad tech-film toiletDark web wardrives straight into the bad tech-film toilet
Dark web wardrives straight into the bad tech-film toilet
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Security
SecuritySecurity
Security
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
The Internet's Suite
The Internet's SuiteThe Internet's Suite
The Internet's Suite
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Silicon Valley goes to the movies
Silicon Valley goes to the moviesSilicon Valley goes to the movies
Silicon Valley goes to the movies
 

More from ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Recently uploaded (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

Top 5 Worst Cybersecurity Movie Scenes

  • 1. Hacking on and off-screen Everything you can imagine is real. But is it, really? In the recent years, cybersecurity borders have been largely outstretched and pop references did not fall much behind. Wait, scratch that. Not only did cinematic producers keep close tabson the evolutionof technologywiththe dawnof the internet,theyevensometimesfoundthemselvesonthe brinkof predictingfuture trends(the Internetof Things wastheireasiestguess).Othertimes,let’sjustsaytheyran out of luck and their imagination wentwaaay overboard. A bit of advice: good fiction doesn’t alwayshave to stray that far away from the truth. As more and more blockbustersandTV shows alike venturedinthe ambitiousjourneyof depictingthe mysterious,yet eversointriguinghackeruniverse,itwastobe expectedthatsome productionswouldperformbetterthanothers. That beingsaid,thisweek’sarticle takesyouthroughthe Top5 worstcybersecuritycinematicreferences.Itisourconviction that, perhaps, by showcasing these examples here, this could actually turn out to be an educational post (for some). #1 The ‘two on a keyboard’ scene At some pointin time,Hollywoodproducersseemed toall agree that hacking,the complex act of gainingunauthorized access to data ina systemorcomputer,needstobe fast. Really fast. Asif,if you’re not typingfastenough,the datawill justrun awayfrom you.The navy cop series NCISshowsyoujusthow heatedsucha cyber-race can get.Not typingfast enough?Then,byall means,let’stype the bothof us. And thenan infinite amountof windowswillopenonthe screen. How would that even work? #2 The ‘I am invincible’ scene BorisGrishenkoisaRussianhackerportrayedbyScottishactorAlanCumminginthe movie GoldenEye.Onthe one hand, he is a talented computer hacker, but on the other, he is also a backstabbing,arrogant misogynist.Believing everyone else is beneath him, he shouts out "I am invincible!" whenever he succeeds. This is one of movie makers’ favorite stereotype ever: hackers are God with Internet. That is, when they’re not too busy portraying them as nerdy social outcasts. #3 The ‘oh, there’s malware’ scene We getthat everythingontelevisionhasto be simplifiedforthe viewertoquicklygraspthe story,but thisgreencode / red code scene in CSI: Cyberis justtoo much. As the name so subtly indicates,thisTV seriesisabouttwothings:(1) the CSI (a team of crime scene investigators) and (2) cybersecurity (or at least, some approximate perception of it). With a reputationof over-exaggeratingthe capabilitiesof amere hackbasedonisolatedeventssuchasthis one,CSI:Cybersets the bar at all time lowasit triesalmosttoohard to pinthe tail on the cybersecuritydonkey. Whereasflashinglightsand special effects are cool and all that, highlighting the malware in red in the middle of a screen filled with green linesof code is,to put it bluntly,absolutelyridiculous.If it where that easyto detecta malware,thenwhy are we not all using this magical bi-color solution? #4 The ‘Deus Ex Machina’ scene ThisSeptember,the teenagemovie‘Nerve’came out.Whilethe ideaof Internetanonymitywaswellexecuted,once the maincharacter, Vee,entersthe final stage of the game, the storyline spills all overthe place.Suddenly,Tommy,one of Vee’s best friends, a rookie-hacker, steps in as the convenient Deus Ex Machina that saves the plot. Tommy suddenly reveals his connections with an influential hacker group that manages to stop the game (in less that 3 minutes) by revealing all watchers’ identities. Oh, well. At least the botnet looked pretty.
  • 2. #5 The ‘kill the virus’ scene We’ve savedthe bestforlastandit’sdefinitelythe 1995 classic‘Hackers’.Itcrossesof ourlistall the previousclichésand addsina newone:the video gamedimension.Yes,inthismovie,the kernel isanactual control towerandvirusesare 3D evil charactersthatgetto be blastedoff withraysof code.Now,we know thatsometimescyber-threatsare soannoying that nothingwouldgive usmore pleasure thatto destroythem, butthe screenwritersof Hackers mighthave takenthe word ‘destroy’ too literally. It becomes clear by this pointinour article that hackingis not a WAMBAM PUFFkind ofactivity. But it’salso obvious thatnobodywill sitdownfor2 straighthourswatchingsomeonetype,notred,not green,butregular codeona screen. Hacking can be a painstakinglyslowprocess, yet there are ways that movies and TV series can fit this notionof time in their plot. One such example and one of our favorites at the moment is, of course, Mr. Robot. Inspiring real-life hackers to cyber-mischief “But I'm only a vigilante hacker by night. By day, just a regular cybersecurity engineer. Employee number ER28-0652” — Elliot Alderson, about himself The storystarts withour main character, Elliot,beingrecruitedintoaband of undergroundhackersbyMr. Robot(a.k.a the group leader).Sufferingfromsocial anxiety,aswell asa drug addiction,what’sinterestingaboutElliotisthe duality within him. He’s not really able to connect with other people, but he sure knows a lot about them since he, to put it bluntly, spies on them. At the confluence between resentment against a superfluous world and the behind-the-scenes peak inside the hacker universe, here are a few reasons why Mr. Robot makes for a great watch for those cyber-aficionados:  It’salmosttooreal at times.Andthe reasonitseemsthatwayisbecause,accordingtothe show’screators,the TV seriesonlyadherestohacks that have alreadyhappenedandthat have beendiligentlystudied.Forinstance,the way the smart home in S02E01 is depicted was enough to send chills down our spines. There were no flashing lightsorvideogamesgraphicsinvolved,instead,Mr.Robotreliedon quaint,multipleactionsinordertodrive the house owner off the edge (blasting the music in the speakers out loud, turning off the thermostat and so on).  It has a goodtempo.There’sno5-secondshackand that issomethingthatthe cybersecurityexpert communityis highlyappreciative of.NotonlydoesMr. Robot respectthe accuracy of a certaincyber-attack,butthe showalso manages to give the impression of tediousness, each new hack being carried out in time.  There are no stereotypes,justavividawarenessof the humannature.Elliot’sattentiontothe personbehindthe machine is dauntingandservesas a propellerforhissocial engineeringtechniques.Once again,enterpriseswith strong securityarchitecturesare compromisednotbecause of applicationvulnerabilities,butbecause of another type of vulnerability all together – man. What makesthisproductioninterestinginthe endistheinsightitprovidesintothe psychological profileof ahacker(and not only).Withthe Season2 finale airing thisweekaroundthe world,Mr.Robot concludesyetanothergreatchapterin the hacker thriller genre. So much so that it’s inspired it’s very own ransomware, named after the group of hacker vigilantes led by Mr. Robot himself – fsociety. Link: https://www.reveelium.com/en/hacking-on-and-off-screen/