Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

It’s not an understatement to suggest that hackers are a hindrance to business. They take what doesn’t belong to them, and worse than that, they use that stolen information to make off with money, misrepresent individual actions, and ultimately, just cause a degree of added entropy that any business simply doesn’t need. Recently, with the hacker group Anonymous consistently in the news and dozens of corporate hacks resulting in millions of people’s personal information being compromised, hackers have been an increased part of the public consciousness.

On January 10, 2016, television producer Sam Esmail stood on the stage at The Beverly Hilton and accepted the award for Best Dramatic Television Series for the show he serves as showrunner on, “Mr. Robot”. The Hollywood foreign press had chosen the series for this award, despite the show’s non-traditional plot, which centers on an anti-social (and hopelessly schizophrenic) network administrator that spends his nights as a seemingly benevolent hacker. Earlier in the evening the show’s co-star, veteran actor Christian Slater, took home the award for Best Supporting Actor in a Drama Series.

With the success of “Mr. Robot”, and other high-profile films and shows that tell the stories of hackers, there has been a suggestion that the entertainment industry unwillingly romanticizes hacker culture (not that sitting alone in a dark room, having a bad haircut, and wearing giant black army boots are actions that people would normally emulate). Take 2015’s Blackhat, a drama directed by Michael Mann. The movie stars one of the more bankable stars in the world at present, Chris Hemsworth, as a federal inmate (convicted of hacking) that is given a furlough to help his college roommate (and Chinese cyber warfare officer) solve a series of high-profile hacking attacks that cause destruction and chaos. In the movie, Hemsworth plays the role of anti-hero; a character that would be a villain in society, and makes good by doing the very thing he has been incarcerated for.

The representation of hackers as the good guys, or the popular anti-hero, is something that Hollywood has embraced for some time. Hackers are most prominent in movies about hacking, obviously, but they also show up in heist movies, and any other movie in which the story has a computer system standing in the way of resolving their goals. If the villain of the story is a hacker or computer, rest assured that the man or woman coming to save the day is a hacker; one of the only types of characters that can overcome a rogue hacker or computing system.

In reality, however, hackers aren’t as interesting or benevolent. Many of them will break down the barriers guarding your client’s and employee’s most sensitive information if they think they can squeeze a buck out of it. That kind of dedicated opportunism, and, to a lesser extent, schadenfreude, make hackers a deplorable result of computer systems’ prevalence throughout the culture. In Hollywood’s defense, hacking makes for a pretty boring movie, but human oppression or destruction, themes that you’ll find in nearly every good hacker movie, aren’t.

There have been dozens of movies about hackers that have been produced over 30 years. Some of them, like “Tron” and “The Matrix,” are science-fiction films that as a design, play with the concept of reality, while movies like “War Games” and “Hackers” present hackers as cognizant wrong-doers, but again present the act of hacking as a means to a heroic end.

Some of the most noteworthy “hacker” movies include:

  • Tron (1982)
  • War Games (1983)
  • Sneakers (1992)
  • The Net (1995)
  • Hackers (1995)
  • The Matrix (1999)
  • Swordfish (2001)
  • Live Free or Die Hard (2007)
  • The Girl with the Dragon Tattoo (2009)
  • BlackHat (2015)

How many of these titles have you seen? Do you think that hackers have been fairly represented in film, or do you think Hollywood has glorified hacking? Please feel free to leave your thoughts in the comments section beneath the blog.

At Total Tech Care, we don’t glorify hackers. We fight them with proactive monitoring and management to ensure that, if someone that doesn’t belong there does try to get into your network, we are there to ensure your network remains safe. For more information about the steps we can take to keep hackers out of your network, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Tech Term Saving Money Social Media Holiday Gadgets Chrome Virtualization Automation Managed IT Services Microsoft Office Managed Service Facebook Cybercrime Operating System Artificial Intelligence Computers BYOD Mobile Device Management Networking Internet of Things IT Support Health Hacking Wi-Fi Covid-19 Information Technology Managed Service Provider Alert Remote Spam Information Office 365 Telephone Systems Router Bandwidth BDR Employer-Employee Relationship Recovery Social Engineering Mobility App Applications History Application Law Enforcement Data Breach Human Resources Big Data Remote Monitoring Password Money Encryption Mobile Computing Office Tips Training Data Storage Patch Management VPN Government Private Cloud Remote Computing Managed IT Blockchain Mobile Office Paperless Office Apps How To IT solutions Voice over Internet Protocol Wireless Entertainment Google Drive Website Budget Vulnerability Gmail Windows 7 Word Avoiding Downtime Settings Servers Two-factor Authentication Mouse Data Security Bring Your Own Device HaaS Data Management Work/Life Balance Flexibility Marketing WiFi Infrastructure Safety Sports HIPAA Redundancy The Internet of Things Conferencing Lithium-ion battery USB Employee/Employer Relationship Keyboard Scam RMM Data Protection Firewall Vendor Management Virtual Reality Save Time Apple Social Cleaning User Error Telephone System Staff Software as a Service Meetings Machine Learning Remote Work Connectivity Vendor End of Support Education Risk Management Managed Services Physical Security Hacker Display Printer Bluetooth Processor DDoS PDF Augmented Reality Fraud SharePoint Hard Drive Business Intelligence Proactive IT Remote Worker Best Practice IT Consultant Worker Audit Customer Service Computing IT Management Cryptocurrency YouTube Black Market Environment Humor Botnet Fax Server IT Plan Comparison Document Management Solid State Drive Unsupported Software Wireless Technology Digital Signage CES SaaS How to Downtime Charger Business Technology Content Management Compliance Network Congestion Data storage Access Control OneNote Computer Care Automobile eWaste Procurement Workplace Strategy Virtual Assistant Net Neutrality Current Events Telephony Authentication Help Desk Samsung Computing Infrastructure Virus Printing Going Green Value Wearable Technology Unified Threat Management Computer Accessories Retail Hard Drives Update Electronic Medical Records Battery Instant Messaging Managed Services Provider Spam Blocking Robot Shadow IT Excel Legal Database Google Docs Hiring/Firing Identity Theft Biometrics Virtual Desktop Remote Workers Internet Exlporer Email Best Practices IT Assessment Tip of the week MSP Manufacturing webinar Accountants Emergency Employer Employee Relationship Credit Cards Professional Services Microchip Public Cloud Thought Leadership Notifications Managed IT Service Password Management Science Security Cameras Assessment Password Manager Computer Tips Printer Server Virtual CIO OneDrive Windows Server 2008 Biometric Security Multi-Factor Security Peripheral Tools Search Engine Relocation Twitter Customer Relationship Management Using Data NIST Television Business Mangement Distributed Denial of Service Digital Security Cameras Video Games Copiers Analyitcs 5G Smart Tech Trending Amazon Worker Commute Quick Tip Programming Addiction Smartwatch Public Computer Recycling Experience Ergonomics Scalability Development Regulations Wiring OLED Practices Transportation Rootkit Amazon Web Services Business Owner Antivirus PCI DSS Virtual Machine Computer Fan Cache Fiber Optics Safe Mode NarrowBand Windows 8 Employee Criminal 2FA Search IT service Messaging GDPR Cabling Workers Hosted Computing Benefits Online Shopping Policy iPhone Hypervisor FENG Wireless Internet Trend Micro File Sharing Tablet IBM Consultant Dark mode Analytics Domains SMS Flash Camera Default App Inventory Smart Technology Specifications Wire Evernote Procedure Files Saving Time Maintenance Shopping Software Tips Chromecast Google Search Supercomputer Best Available Travel IaaS dark theme Millennials AI Sync Printers Bloatware IT Infrastructure Emails WIndows 7 Smart Office Uninterrupted Power Supply Bing Wireless Charging FinTech Colocation Social Network Tablets Two Factor Authentication Workforce Virtual Private Network Monitor Entrepreneur Investment Netflix Employee/Employer Relationships Root Cause Analysis Cables Employees Windows 365 Shortcut HBO ISP Knowledge Music User Telecommuting PowerPoint Windows Media Player Video Conferencing Skype Project Management Reputation Cost Management ROI Nanotechnology Streaming Media Social Networking Bitcoin Data loss Tech Support Shortcuts Cortana Content Sales Point of Sale Techology Personal Outlook Laptop Cryptomining Leadership Digital Signature Troubleshooting Managing Stress Supply Chain Management Start Menu Warranty Customers Batteries Screen Mirroring HVAC Loyalty Google Apps Audiobook Running Cable Monitoring Cameras Windows 8.1 Digitize Frequently Asked Questions Touchpad Memory Analysis Books Mobile Administrator Windows Server 2008 R2 Windows 10s Devices Cast Enterprise Content Management Politics Customer relationships Advertising

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code