(832) 295-1445    Get SUPPORT

Walsh IT Group Blog

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:


Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and Walsh IT Group’s IT experts can help. Call us today at (832) 295-1445 to get started learning how to protect yourself against today’s most powerful hacks.

Are You Backing Up All the Data You Need?
Tip of the Week: How to Hide Yourself from Skype


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology User Tips Productivity Tech Term Network Security Communication Efficiency Email Business Privacy Mobile Devices Hackers Small Business IT Support Google Software Business Computing Cloud Microsoft Data Backup Data Recovery Managed IT Services Android Computer Internet Smartphone Saving Money Ransomware Data IT services Malware Managed IT Services Vulnerability Paperless Office Users business continuity Hardware Workplace Tips Browser Business Management disaster recovery Microsoft Office Backup Outsourced IT Passwords Applications Office 365 Windows 10 Hosted Solutions Managed Service Encryption BYOD Cybersecurity Information Server Cloud Computing Word VoIp Innovation Government Company Culture Communications Employee-Employer Relationship Internet of Things Router Managed Service Provider Access Control Mobile Device Tip of the week Remote Monitoring Chrome Employer-Employee Relationship Document Management Infrastructure Website Artificial Intelligence Data Management Social Media Maintenance Holiday App Antivirus VPN Facebook Networking Phishing Content Filtering Display Business Technology Managing Stress Virtual Reality Bandwidth virtual private network Data Security Risk Management Mobile Security Windows Money Automation Chromebook Network Analytics Compliance Upgrade Windows 10 Smartphones Tablet Gmail Hacker Business Intelligence HIPAA Development Two-factor Authentication Scam Operating System Content Permissions Chatbots How to Smart Office Spying Gadgets Nanotechnology Break Fix Mirgation Value Analysis Shortcuts Cooperation Taxes Entertainment Connectivity Assessment Wireless Multi-Factor Security Education Data loss Tracking Quick Tips Smart Technology Automobile Printer Streaming Fraud Identity Theft Work Computing G Suite Augmented Reality IT Unified Threat Management Dark Web Messaging IT Management Professional Services Legislation Security Cameras Staff Apple Tech Support The Internet of Things Internet Exlporer Charging Alert Mobility Computing Infrastructure Spam YouTube Laptop Firewall Voice over Internet Protocol Wi-Fi Identity Optimization PowerPoint Comparison Computers Support Avoiding Downtime LED Storage How To USB Downtime Modem Data storage iOS IT Technicians IoT Solid State Drive Emergency Printing Alerts Social Networking Solar Touchscreen Service Hard Disk Drive FinTech SharePoint Human Error Patch Management Recycling Onboarding Lenovo Specifications Laptops Cables Miscellaneous User Error Co-Managed IT Remote Computing Dongle Slack Mouse Managed Services Scalability Print Toner Licensing Shortcut WiFi Desktop Distributed Denial of Service Wearable Technology Screen Reader Star Wars MSP Mail Merge Downloads Mobile Device Management Hotspot Point of Sale eWaste Save Money Superfish Black Friday Software as a Service Wires Microsoft Excel Update Blockchain Supercomputer Service Level Agreement Monitoring Virtualization Cookies Google Maps IT Budget Managed IT Service Migration Server Management Vendor Management Regulation Samsung Google Calendar Motherboard Outlook GPS Troubleshooting Techology Smart Tech Cost Management Address Device Language Regulations Continuity Digital Signage Cyber Monday Retail Windows 7 BDR Printers Twitter