Get Started Today!  (954) 834-2800

croom new

KB Technologies Blog

KB Technologies has been serving the Deerfield Beach area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Right and Wrong of the Hollywood Hack

The Right and Wrong of the Hollywood Hack

Movies and television shows are a big part of our culture. When hackers are portrayed on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of plot. Today, we will look at hacker portrayals, and what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood
Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception
One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like he/she was sending an email.

This is your average hacker screen from a movie or tv show:

https://www.youtube.com/watch?v=A1xkXhYJKQ4

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers' screens most likely look a lot like your screen, with browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization's network requires more research than typing-pool skills. In fact, for today’s hacker, the computer and applications they use is as much of the story as is the timing. It’s simply not cinematically pleasing to sit around and watch people type, so they come up with all types of ludicrous graphics to represent the network's security they are trying to work around.

People need to know how to protect themselves against hackers, and KB Technologies' IT experts can help. Call us today at (954) 834-2800 to start learning how to protect yourself against today’s most powerful hacks.

Tired Of Annoying Computer Problems That Keep Coming Back?

Are You Backing Up All the Data You Need?
Tip of the Week: How to Hide Yourself from Skype
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, November 07 2024

Captcha Image

Reach Out Today!

First Name *
Last Name
Email *
Company Name
Phone *
Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Latest Blog

We’re all hooked on our devices. You likely wouldn’t think about driving an hour each way to retrieve your smartphone if you left it at home and would otherwise be without it for a couple of days. It’s not even an option to go that long without access to your phone nowadays....

Latest News

KB Technologies Managed IT is proud to announce the launch of our new website at http://www.kb-it.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...