Skip to content

The Right and Wrong of the Hackers in Hollywood

Movies and television shows are a big part of our culture. When hackers are portrayed in Hollywood on the silver (or small) screen, there are some major dramatic elements added to their performances to keep the audience from dismissing key pieces of the plot. Today, we will look at hacker portrayals, what Hollywood gets right, and what it gets completely wrong.

Hackers in Hollywood

Ever since the mid-1990s, when the Internet started to grow fast, screenwriters have been authoring stories about computer hackers. After all, they provide one of the essential characteristics of any story, conflict. In movies and television, hackers are almost exclusively portrayed by young, anti-social people; and, are typically seeking revenge for some perceived slight brought on them or their family by some type of corporate entity.

If they don’t fit that paradigm, then they are typically dystopian science fiction movies/shows where they are hacking to save humanity from nefarious machines, subversive human groups, or aliens. This, of course, is in contrast to the way that we look at hackers; and, while there are a fair amount of “white hat” hackers that work for the “good guys” to expose vulnerabilities for organizations to help keep them safe, most hackers are simply trying to get over on the people and organizations they target.

Differences Between Reality and Perception

One of the major differences in perception is in what a hacker does. In the media, the hacker is portrayed as sitting at a high-powered laptop that they keep in their jacket, typing 80 words per minute without a mistake, cracking system encryption like they were sending an email.

Here’s an example of bad TV hacking:

https://www.youtube.com/watch?v=A1xkXhYJKQ4

Of course, this is completely ridiculous. In reality, a video of a hacker sending an email would be more apt. A real hacker’s screen is one with function. There are command prompts and open windows with real applications that help them diagnose possible vulnerabilities. Today’s hackers’ screens most likely look a lot like your screen. They may have browsers open, a word processing app to create content, and maybe a graphics problem for the hacker with ingenuity.

The act of actually hacking into an organization’s network requires more research than typing-pool skills. In fact, for today’s hackers, the computer and applications they use are as much of the story as the timing. It’s simply not pleasing to sit around and watch people type. Therefore, they come up with all types of ludicrous graphics to represent the network’s security they are trying to work around.

People need to know how to protect themselves against hackers, and WheelHouse IT’s experts can help. Call us today at (877) 771-2384 to get started learning how to protect yourself against today’s most powerful hacks.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.