Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

It’s not an understatement to suggest that hackers are a hindrance to business. They take what doesn’t belong to them, and worse than that, they use that stolen information to make off with money, misrepresent individual actions, and ultimately, just cause a degree of added entropy that any business simply doesn’t need. Recently, with the hacker group Anonymous consistently in the news and dozens of corporate hacks resulting in millions of people’s personal information being compromised, hackers have been an increased part of the public consciousness.

On January 10, 2016, television producer Sam Esmail stood on the stage at The Beverly Hilton and accepted the award for Best Dramatic Television Series for the show he serves as showrunner on, “Mr. Robot”. The Hollywood foreign press had chosen the series for this award, despite the show’s non-traditional plot, which centers on an anti-social (and hopelessly schizophrenic) network administrator that spends his nights as a seemingly benevolent hacker. Earlier in the evening the show’s co-star, veteran actor Christian Slater, took home the award for Best Supporting Actor in a Drama Series.

With the success of “Mr. Robot”, and other high-profile films and shows that tell the stories of hackers, there has been a suggestion that the entertainment industry unwillingly romanticizes hacker culture (not that sitting alone in a dark room, having a bad haircut, and wearing giant black army boots are actions that people would normally emulate). Take 2015’s Blackhat, a drama directed by Michael Mann. The movie stars one of the more bankable stars in the world at present, Chris Hemsworth, as a federal inmate (convicted of hacking) that is given a furlough to help his college roommate (and Chinese cyber warfare officer) solve a series of high-profile hacking attacks that cause destruction and chaos. In the movie, Hemsworth plays the role of anti-hero; a character that would be a villain in society, and makes good by doing the very thing he has been incarcerated for.

The representation of hackers as the good guys, or the popular anti-hero, is something that Hollywood has embraced for some time. Hackers are most prominent in movies about hacking, obviously, but they also show up in heist movies, and any other movie in which the story has a computer system standing in the way of resolving their goals. If the villain of the story is a hacker or computer, rest assured that the man or woman coming to save the day is a hacker; one of the only types of characters that can overcome a rogue hacker or computing system.

In reality, however, hackers aren’t as interesting or benevolent. Many of them will break down the barriers guarding your client’s and employee’s most sensitive information if they think they can squeeze a buck out of it. That kind of dedicated opportunism, and, to a lesser extent, schadenfreude, make hackers a deplorable result of computer systems’ prevalence throughout the culture. In Hollywood’s defense, hacking makes for a pretty boring movie, but human oppression or destruction, themes that you’ll find in nearly every good hacker movie, aren’t.

There have been dozens of movies about hackers that have been produced over 30 years. Some of them, like “Tron” and “The Matrix,” are science-fiction films that as a design, play with the concept of reality, while movies like “War Games” and “Hackers” present hackers as cognizant wrong-doers, but again present the act of hacking as a means to a heroic end.

Some of the most noteworthy “hacker” movies include:

  • Tron (1982)
  • War Games (1983)
  • Sneakers (1992)
  • The Net (1995)
  • Hackers (1995)
  • The Matrix (1999)
  • Swordfish (2001)
  • Live Free or Die Hard (2007)
  • The Girl with the Dragon Tattoo (2009)
  • BlackHat (2015)

How many of these titles have you seen? Do you think that hackers have been fairly represented in film, or do you think Hollywood has glorified hacking? Please feel free to leave your thoughts in the comments section beneath the blog.

At Total Tech Care, we don’t glorify hackers. We fight them with proactive monitoring and management to ensure that, if someone that doesn’t belong there does try to get into your network, we are there to ensure your network remains safe. For more information about the steps we can take to keep hackers out of your network, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Upgrade Managed IT Services Windows Phishing Outsourced IT Data Backup Ransomware Windows 10 Server Save Money Data Recovery Office Cloud Computing Passwords Windows 10 Social Media Chrome Virtualization Gadgets Tech Term Saving Money Holiday Automation Microsoft Office Managed IT Services Managed Service Operating System Cybercrime Computers Artificial Intelligence Facebook IT Support Hacking Health Internet of Things BYOD Mobile Device Management Wi-Fi Networking Information Technology Remote Managed Service Provider Covid-19 Information Spam Office 365 Alert Telephone Systems Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Bandwidth Encryption Big Data Data Breach Applications Human Resources Law Enforcement Remote Monitoring Mobile Computing Application App Password History Money VPN Blockchain Paperless Office Remote Computing Government Mobile Office Private Cloud How To Managed IT Office Tips Data Storage Apps Training Patch Management Vulnerability Gmail Windows 7 Word Settings Google Drive Servers Two-factor Authentication Avoiding Downtime Flexibility Mouse Data Security Marketing HaaS WiFi IT solutions Entertainment Infrastructure Website Voice over Internet Protocol Budget Bring Your Own Device Data Management Work/Life Balance Wireless Lithium-ion battery Scam End of Support Physical Security Education Safety Firewall HIPAA Sports Vendor Management Redundancy Vendor Keyboard Virtual Reality Managed Services Apple Display Telephone System Staff Software as a Service Machine Learning Social Remote Work Connectivity User Error Employee/Employer Relationship Meetings RMM Save Time USB Risk Management Hacker Cleaning The Internet of Things Conferencing Data Protection SharePoint Business Intelligence Procurement Battery Net Neutrality Shadow IT Workplace Strategy Comparison Audit Worker Legal Help Desk IT Management CES Customer Service Printing Environment Internet Exlporer Botnet Business Technology IT Plan Content Management Fax Server PDF Access Control Managed Services Provider Virtual Assistant Unsupported Software SaaS Database Proactive IT Virus Authentication Charger Best Practice Unified Threat Management Remote Workers Compliance Network Congestion YouTube Computer Accessories OneNote Computer Care eWaste Processor Black Market Current Events Update Telephony Samsung Hard Drive Google Docs Document Management Identity Theft Solid State Drive Wireless Technology Printer Value Wearable Technology How to Bluetooth Downtime Retail Hard Drives Computing Spam Blocking Electronic Medical Records Instant Messaging Excel Robot Data storage Augmented Reality Automobile Fraud Hiring/Firing Biometrics IT Consultant Virtual Desktop Digital Signage Computing Infrastructure Remote Worker Going Green Humor Cryptocurrency DDoS Amazon Web Services AI IT Infrastructure Techology Laptop Tools Cache Customers Safe Mode Criminal FinTech Television Distributed Denial of Service Customer Relationship Management Bing Social Network Audiobook Consultant GDPR Analyitcs Hosted Computing Online Shopping Investment Programming Touchpad Analytics Wireless Internet File Sharing Employees Public Computer Employee/Employer Relationships Politics Transportation ISP Advertising Best Available Camera Regulations Inventory Windows 365 Specifications Computer Fan Evernote Video Conferencing Rootkit Antivirus ROI WIndows 7 Wire Shortcuts Windows 8 Notifications Sales Travel Bitcoin Personal Benefits IT service Cryptomining Printers Point of Sale Workers Millennials FENG Wireless Charging Supply Chain Management Smart Office Relocation Tablet Monitoring IBM Batteries Digitize Smart Technology Domains Virtual Private Network Flash Windows 8.1 Workforce PowerPoint Windows Media Player Cables Windows Server 2008 R2 Video Games User Maintenance Software Tips Customer relationships Supercomputer IaaS Worker Commute Telecommuting IT Assessment Experience Manufacturing Project Management Bloatware Sync Nanotechnology Email Best Practices Emails Cortana Scalability Managing Stress Security Cameras Tablets Digital Signature Computer Tips Managed IT Service Business Owner OneDrive Two Factor Authentication Biometric Security Warranty Entrepreneur NarrowBand Cameras Virtual CIO Netflix HVAC Root Cause Analysis Google Apps Peripheral Search Shortcut iPhone HBO Analysis Digital Security Cameras Knowledge Using Data Music Copiers 5G Administrator Cost Management Skype Devices Enterprise Content Management Data loss Quick Tip Social Networking Smartwatch Files MSP Outlook Accountants Ergonomics Leadership Troubleshooting Credit Cards Development OLED Microchip Chromecast Start Menu Printer Server Thought Leadership Password Management Screen Mirroring Password Manager PCI DSS Loyalty Running Cable Virtual Machine Books Employee Colocation Memory Uninterrupted Power Supply Frequently Asked Questions 2FA Multi-Factor Security Fiber Optics Windows 10s Messaging Cabling Search Engine Mobile Twitter NIST Cast Business Mangement Policy Hypervisor Monitor Emergency Tip of the week Smart Tech Dark mode webinar Trending Trend Micro Public Cloud Amazon SMS Employer Employee Relationship Default App Professional Services Addiction Reputation Science Streaming Media Recycling Procedure Assessment Saving Time Content Google Search Wiring Tech Support Windows Server 2008 Practices dark theme Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code