Hollywood hackers are often portrayed as omniscient entities, easily identifiable by their oversized hoods and near-supernatural abilities. But should we really believe everything we see on the screen? The answer is no. While these portrayals are entertaining, they don’t always reflect the reality of hacking. Here’s an analysis of what Hollywood has done right and wrong about fictional hackers, as well as some practical cybersecurity lessons.
In the movie Ex Machina, programmers manage to create a human-like AI equipped with a stolen smartphone, which they remotely control via the cameras. This scene highlights a real problem: some downloaded applications can access your location, your microphone and even your camera. To avoid this kind of threat, it’s important to check app permissions before installing them, and only download from trusted sources.
The Blackhat movie shows hackers installing keyloggers on a company’s devices via a phishing email containing a malicious PDF file. This depiction is in line with alarming statistics: 88% of data breaches are caused by human error. Cybercriminals are not only technically skilled, but also adept at manipulation and identity theft.
Contrary to cinematic representations, where attacks seem to take place in a matter of seconds, the reality is often much more complex. Most cybercriminals spend hours, even days, researching and preparing their attacks. Some 60% of ethical hackers say it takes them five hours or less to break into a system once a vulnerability has been identified.
In the movies, hackers are often portrayed as marginal youngsters working alone. In reality, many hackers are experienced professionals, sometimes affiliated with organized crime networks or supported by government agencies. They can also be recruited by governments for specific operations.
In the movies, heroes often stop cyberattacks by quickly pressing the right sequence of keys. In reality, when you’re faced with a security breach, the best response is to immediately disconnect your device from the network and alert your IT team.
True. In the movie The Flight Attendant, the heroine has to bypass two-factor authentication to access her enemy’s password. This mechanism is essential to protect against cybercriminals, who can use specialized software to test password combinations.
False. Cybercriminals can be very sociable and are not exclusively male. Many women are also involved in hacking, even if Hollywood tends to exclude them from leading roles.
False. Hackers target companies of all sizes, often favoring those with fewer security resources.
Hollywood may provide compelling entertainment, but it’s important not to take its depictions of hacking as absolute truths. Learning to separate fact from fiction can teach you valuable lessons about protecting your business, your devices, and your personal information. Stay vigilant and remember that life imitates art, but cybersecurity is far more complex than what we see on the screen.
To take the protection of your systems and data a step further, discover ited’s cybersecurity services.
All rights reserved | © 2022 Solutions Ited | Privacy Policy | Terms of use