Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

Hollywood is Captivated By Fictional Hackers, But Real Hackers aren’t Entertaining

It’s not an understatement to suggest that hackers are a hindrance to business. They take what doesn’t belong to them, and worse than that, they use that stolen information to make off with money, misrepresent individual actions, and ultimately, just cause a degree of added entropy that any business simply doesn’t need. Recently, with the hacker group Anonymous consistently in the news and dozens of corporate hacks resulting in millions of people’s personal information being compromised, hackers have been an increased part of the public consciousness.

On January 10, 2016, television producer Sam Esmail stood on the stage at The Beverly Hilton and accepted the award for Best Dramatic Television Series for the show he serves as showrunner on, “Mr. Robot”. The Hollywood foreign press had chosen the series for this award, despite the show’s non-traditional plot, which centers on an anti-social (and hopelessly schizophrenic) network administrator that spends his nights as a seemingly benevolent hacker. Earlier in the evening the show’s co-star, veteran actor Christian Slater, took home the award for Best Supporting Actor in a Drama Series.

With the success of “Mr. Robot”, and other high-profile films and shows that tell the stories of hackers, there has been a suggestion that the entertainment industry unwillingly romanticizes hacker culture (not that sitting alone in a dark room, having a bad haircut, and wearing giant black army boots are actions that people would normally emulate). Take 2015’s Blackhat, a drama directed by Michael Mann. The movie stars one of the more bankable stars in the world at present, Chris Hemsworth, as a federal inmate (convicted of hacking) that is given a furlough to help his college roommate (and Chinese cyber warfare officer) solve a series of high-profile hacking attacks that cause destruction and chaos. In the movie, Hemsworth plays the role of anti-hero; a character that would be a villain in society, and makes good by doing the very thing he has been incarcerated for.

The representation of hackers as the good guys, or the popular anti-hero, is something that Hollywood has embraced for some time. Hackers are most prominent in movies about hacking, obviously, but they also show up in heist movies, and any other movie in which the story has a computer system standing in the way of resolving their goals. If the villain of the story is a hacker or computer, rest assured that the man or woman coming to save the day is a hacker; one of the only types of characters that can overcome a rogue hacker or computing system.

In reality, however, hackers aren’t as interesting or benevolent. Many of them will break down the barriers guarding your client’s and employee’s most sensitive information if they think they can squeeze a buck out of it. That kind of dedicated opportunism, and, to a lesser extent, schadenfreude, make hackers a deplorable result of computer systems’ prevalence throughout the culture. In Hollywood’s defense, hacking makes for a pretty boring movie, but human oppression or destruction, themes that you’ll find in nearly every good hacker movie, aren’t.

There have been dozens of movies about hackers that have been produced over 30 years. Some of them, like “Tron” and “The Matrix,” are science-fiction films that as a design, play with the concept of reality, while movies like “War Games” and “Hackers” present hackers as cognizant wrong-doers, but again present the act of hacking as a means to a heroic end.

Some of the most noteworthy “hacker” movies include:

  • Tron (1982)
  • War Games (1983)
  • Sneakers (1992)
  • The Net (1995)
  • Hackers (1995)
  • The Matrix (1999)
  • Swordfish (2001)
  • Live Free or Die Hard (2007)
  • The Girl with the Dragon Tattoo (2009)
  • BlackHat (2015)

How many of these titles have you seen? Do you think that hackers have been fairly represented in film, or do you think Hollywood has glorified hacking? Please feel free to leave your thoughts in the comments section beneath the blog.

At Total Tech Care, we don’t glorify hackers. We fight them with proactive monitoring and management to ensure that, if someone that doesn’t belong there does try to get into your network, we are there to ensure your network remains safe. For more information about the steps we can take to keep hackers out of your network, call us today at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Save Money Data Recovery Office Server Cloud Computing Passwords Windows 10 Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Wi-Fi Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Managed Service Provider Office 365 Telephone Systems Information Technology Information Remote Covid-19 Spam Alert Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Big Data Password Money App History Encryption Data Breach Applications Mobile Computing Human Resources Application Law Enforcement Remote Monitoring Data Storage Patch Management Apps Blockchain Office Tips Paperless Office Training VPN Government Remote Computing How To Private Cloud Mobile Office Managed IT Bring Your Own Device Data Management Work/Life Balance Vulnerability Windows 7 Word Wireless Flexibility Gmail Marketing Servers Google Drive WiFi Settings IT solutions Infrastructure Entertainment Voice over Internet Protocol Website Budget Avoiding Downtime Data Security Two-factor Authentication Mouse HaaS RMM Cleaning Conferencing Risk Management Hacker Scam End of Support Software as a Service The Internet of Things Telephone System Staff Education Lithium-ion battery Physical Security Machine Learning Safety Connectivity Remote Work Vendor Management Sports HIPAA Redundancy Firewall Keyboard USB Virtual Reality Vendor Apple Managed Services Display Social Data Protection User Error Save Time Meetings Employee/Employer Relationship Hard Drives CES Retail Instant Messaging Computing Infrastructure Computing Robot Excel Business Technology Going Green Content Management Access Control Biometrics Business Intelligence Virtual Desktop Virtual Assistant Authentication Virus Audit Worker Battery Shadow IT Digital Signage DDoS IT Management Legal Unified Threat Management Computer Accessories Botnet SharePoint Internet Exlporer IT Plan Update Procurement Workplace Strategy PDF Net Neutrality Unsupported Software Customer Service Google Docs Environment Printer Help Desk Identity Theft Charger Bluetooth Printing Proactive IT Fax Server Compliance Best Practice OneNote Computer Care Current Events YouTube SaaS Telephony Augmented Reality Black Market Managed Services Provider Fraud Samsung IT Consultant Database Network Congestion Remote Worker Remote Workers eWaste Value Document Management Solid State Drive Cryptocurrency Wireless Technology Humor Spam Blocking Electronic Medical Records How to Downtime Processor Comparison Hiring/Firing Data storage Hard Drive Wearable Technology Automobile webinar Emergency Copiers File Sharing 5G Tip of the week Inventory Professional Services Specifications Public Cloud Employer Employee Relationship Quick Tip Camera Monitor Best Available WIndows 7 Wire Smartwatch Running Cable Evernote Assessment Ergonomics Travel Memory Development OLED Windows Server 2008 Streaming Media Tools Millennials PCI DSS Printers Reputation Virtual Machine Fiber Optics Smart Office Tech Support Employee Wireless Charging Television Content 2FA Techology Messaging Laptop Cabling Workforce Policy Virtual Private Network Customers Hypervisor User Trend Micro PowerPoint Cables Windows Media Player Public Computer Audiobook Dark mode Science Transportation SMS Touchpad Default App Regulations Nanotechnology Telecommuting Computer Fan Rootkit Procedure Project Management Saving Time Advertising Managing Stress Shopping Google Search Distributed Denial of Service Cortana Customer Relationship Management Politics dark theme Workers Analyitcs Benefits AI IT Infrastructure Digital Signature Notifications Cameras Bing FENG Programming FinTech Warranty Social Network HVAC Google Apps IBM Smart Technology Investment Analysis Flash Employee/Employer Relationships Devices Antivirus Employees Administrator Relocation Windows 365 Windows 8 Enterprise Content Management ISP Software Tips Supercomputer Sync IT service Emails Video Games Video Conferencing MSP ROI Accountants Bitcoin Thought Leadership Printer Server Shortcuts Credit Cards Worker Commute Sales Microchip Experience Point of Sale Tablet Personal Password Management Cryptomining Password Manager Domains Multi-Factor Security Netflix Two Factor Authentication Scalability Supply Chain Management Search Engine Batteries Twitter Root Cause Analysis Business Owner Monitoring Knowledge Windows 8.1 Music Digitize NIST NarrowBand IaaS Business Mangement HBO Maintenance Smart Tech Skype Trending Bloatware Search Windows Server 2008 R2 iPhone Addiction Amazon Data loss Customer relationships Leadership Email Best Practices Tablets Troubleshooting IT Assessment Manufacturing Recycling Outlook Practices Start Menu Entrepreneur Wiring Files Managed IT Service Cache Security Cameras Amazon Web Services Screen Mirroring Loyalty Computer Tips Virtual CIO Books OneDrive Safe Mode Chromecast Biometric Security Criminal Frequently Asked Questions Shortcut Hosted Computing Mobile Windows 10s Cost Management Peripheral GDPR Consultant Colocation Using Data Wireless Internet Uninterrupted Power Supply Analytics Online Shopping Cast Social Networking Digital Security Cameras

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code