{"id":99796,"date":"2019-09-05T13:55:34","date_gmt":"2019-09-05T13:55:34","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=434240"},"modified":"2019-09-05T13:55:34","modified_gmt":"2019-09-05T13:55:34","slug":"hacker-movies-that-have-an-echo-of-truth","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2019\/09\/05\/hacker-movies-that-have-an-echo-of-truth\/","title":{"rendered":"Hacker movies that have an echo of truth"},"content":{"rendered":"<p>Films about hacks and cyberattacks have been popular for decades. These movies helped create the image of the hacker genius \u2014 just think of Stanley Jobson in \u201cSwordfish.\u201d<\/p>\n<p>There is \u201cHackers,\u201d in which a group of high schoolers access the mainframe of an oil company and discover evidence of embezzlement and \u201cThe Net,\u201d about a woman (Sandra Bullock) whose identity is stolen.<\/p>\n<p>You may think Hollywood depictions of hacking bear no resemblance to real life, but in each of the films below, there is an echo of truth in the fiction.<\/p>\n<p><em>[Subscribe to <\/em><a href=\"https:\/\/news.microsoft.com\/on-the-issues\/\"><em>Microsoft on the Issues<\/em><\/a><em> for more on the topics that matter most.]<\/em><\/p>\n<p><em>&nbsp;<\/em><strong>\u201cThe Italian Job\u201d (1969)<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7717 size-full\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/09\/hacker-movies-that-have-an-echo-of-truth.jpg\" alt=\"The Italian Job\" width=\"5554\" height=\"4146\"><\/p>\n<p>A classic caper on a list of hacker movies. This story of British bank robbers undertaking a job in Turin, Italy, offers a surprising nod of things to come.<\/p>\n<p>How do Michael Caine and his team plan to escape from this city? By hacking its traffic light system and causing widespread gridlock. This leads to the famous Mini Cooper getaway scene.<\/p>\n<p>From Saudi Arabia to South Africa, billions of dollars are being invested in smart city projects. Some researchers estimate that <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fbits.blogs.nytimes.com%2F2015%2F06%2F10%2Ftraffic-hacking-caution-light-is-on%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640419072&amp;sdata=mJ1stfzCm67li7as92AvYyGp51DPeNi1Y2qYP7Tvk1A%3D&amp;reserved=0\">spending on smart cities will reach $27.5 billion<\/a> by 2023. It makes protecting those cities reliant on technology from disruption ever more crucial.<\/p>\n<p><strong>\u201cWarGames\u201d (1983)<\/strong><\/p>\n<p>At the height of the Cold War, a young hacker (Matthew Broderick) <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.nytimes.com%2F1983%2F06%2F03%2Fmovies%2Fwargames-a-computer-fantasy.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640429065&amp;sdata=8dIwy7Nj03Mfm8Bm67uQPXDoXCj0%2BATcKJoRgP2jRKg%3D&amp;reserved=0\">breaks into a US military supercomputer<\/a> and comes close to starting a nuclear war. He thinks he\u2019s playing a game based on a simulation, but this is not a drill.<\/p>\n<p>According to a 2016 study by ISACA and RSA Conference, 74 percent of the world\u2019s businesses expect to be hacked each year. And the economic loss due to cybercrime is estimated to reach $3 trillion by 2020.&nbsp; It is one of the reasons that Microsoft has called for a <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention\/#_ftn\">Digital Geneva Convention<\/a> to help protect cyberspace in times of peace.<\/p>\n<p><strong>\u201cSneakers\u201d (1992)<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7718 size-full aligncenter\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/09\/hacker-movies-that-have-an-echo-of-truth-1.jpg\" alt=\"Sneakers\" width=\"5435\" height=\"3695\"><\/p>\n<p>This tech thriller, which spans from the late 1960s to the more computer-literate 1990s, boasts a heavyweight cast that includes Robert Redford and Sidney Poitier. A team of security specialists is approached by the NSA and <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.nytimes.com%2F1992%2F09%2F09%2Fmovies%2Freviews-film-a-1970-s-caper-movie-with-heroes-of-the-time.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640439059&amp;sdata=YDz0WcqlS6cTIQK3eq1NuTptPC1Aub6SRsXuSadkbMY%3D&amp;reserved=0\">commissioned to locate a mysterious black<\/a> box. This team, propelled into a world of espionage, is soon hunted by rogue agents. The box turns out to be the key to cracking all known encryption and is, the team realizes, too powerful to fall into the wrong hands.<\/p>\n<p>In 1992, the idea that something could break all known encryption sounded scary and a little implausible. Today, the existence of such technology is more likely thanks to quantum computing.<\/p>\n<p>According to Martin Giles of the MIT Technology Review, quantum computers are \u201ca security threat that we\u2019re still <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.technologyreview.com%2Fs%2F612509%2Fquantum-computers-encryption-threat%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640449054&amp;sdata=H6kH3eXPplEw7%2BrdklKIrqSTMO%2BeR6wzH3IqaJkeIZA%3D&amp;reserved=0\">totally unprepared for<\/a>,\u201d and it could be 20 years before cybersecurity catches up. Working closely with the United States National Institute for Standards and Technology, Microsoft is engaged with the development of <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fresearch%2Fproject%2Fpost-quantum-cryptography%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640449054&amp;sdata=9VSZJCeZAkxCnc8jzzZI4xEIR6lCMYkNUNgCHb9fQhE%3D&amp;reserved=0\">post-quantum cryptography<\/a> that will be able to withstand quantum computer capabilities, while still working with existing protocols.<\/p>\n<p><strong>\u201cHackers\u201d (1995)<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7719 size-full\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/09\/hacker-movies-that-have-an-echo-of-truth-2.jpg\" alt=\"Hackers\" width=\"1371\" height=\"960\"><\/p>\n<p>Starring Angelina Jolie and Jonny Lee Miller, \u201cHackers\u201d is the story of <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.nytimes.com%2F1995%2F09%2F15%2Fmovies%2Ffilm-review-those-wacky-teen-agers-and-their-crazy-fads.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640459053&amp;sdata=sQGUu33g9oAKRjUEcgIYiqdLVeBIkWDsq6YewF7r850%3D&amp;reserved=0\">a group of high school technology enthusiasts with codenames and complicated backstories<\/a>. They hack into the mainframe of an oil company and discover evidence of embezzlement \u2014 but their activities are soon detected.<\/p>\n<p>Robust cybersecurity is important for businesses and to the future of national economies, and it has become a priority for governments around the world. The <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/04\/17\/34-companies-stand-up-for-cybersecurity-with-a-tech-accord\/\">Cybersecurity Tech Accord<\/a><em>, <\/em>announced by Microsoft in April 2018, is a public commitment among more than 100 global companies to protect and empower civilians online and help defend them against threats.<\/p>\n<p><strong>\u201cThe Net\u201d (1995)<\/strong><\/p>\n<p>Sandra Bullock plays the lead role in this <a href=\"https:\/\/www.nytimes.com\/1995\/07\/28\/movies\/film-review-do-you-exist-if-the-internet-erases-you.html\">thriller<\/a> that foreshadows one worry of the modern security landscape: identity theft.<\/p>\n<p>Admittedly, in 1995, many important records were still paper-based, after all. Still, this is one of the central themes in the plot: Can Angela Bennett (Bullock) overcome a series of interconnected threats and regain her identity?<\/p>\n<p>Today, secure passwords are a must. There is a wealth of personal data stored digitally that can all too easily compromise the security of your identity.<\/p>\n<p><em>Cyberspace has become a battlefield and powerful cyberweapons are being used against civilians. Tools and Weapons, by Microsoft President Brad Smith and Carol Ann Browne, looks at how the world can respond. To read more and pre-order the book, visit<\/em> <em><a href=\"https:\/\/news.microsoft.com\/on-the-issues\/tools-and-weapons\">Tools and Weapons<\/a>.<\/em> <em>And follow <a href=\"https:\/\/aka.ms\/AA5c3au\">@MSFTIssues<\/a> on Twitter.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Films about hacks and cyberattacks have been popular for decades. These movies helped create the image of the hacker genius \u2014 just think of Stanley Jobson in \u201cSwordfish.\u201d There is \u201cHackers,\u201d in which a group of high schoolers access the mainframe of an oil company and discover evidence of embezzlement and \u201cThe Net,\u201d about a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":99797,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[50,52],"class_list":["post-99796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-recent-news","tag-security"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/99796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=99796"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/99796\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/99797"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=99796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=99796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=99796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}