Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft - Hacker movies that have an echo of truth

#1
Hacker movies that have an echo of truth

<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2019/09/hacker-movies-that-have-an-echo-of-truth.jpg" width="5554" height="4146" title="" alt="" /></div><div><p>Films about hacks and cyberattacks have been popular for decades. These movies helped create the image of the hacker genius — just think of Stanley Jobson in “Swordfish.”</p>
<p>There is “Hackers,” in which a group of high schoolers access the mainframe of an oil company and discover evidence of embezzlement and “The Net,” about a woman (Sandra Bullock) whose identity is stolen.</p>
<p>You may think Hollywood depictions of hacking bear no resemblance to real life, but in each of the films below, there is an echo of truth in the fiction.</p>
<p><em>[Subscribe to </em><a href="https://news.microsoft.com/on-the-issues/"><em>Microsoft on the Issues</em></a><em> for more on the topics that matter most.]</em></p>
<p><em>&nbsp;</em><strong>“The Italian Job” (1969)</strong></p>
<p><img class="aligncenter wp-image-7717 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/09/hacker-movies-that-have-an-echo-of-truth.jpg" alt="The Italian Job" width="5554" height="4146"></p>
<p>A classic caper on a list of hacker movies. This story of British bank robbers undertaking a job in Turin, Italy, offers a surprising nod of things to come.</p>
<p>How do Michael Caine and his team plan to escape from this city? By hacking its traffic light system and causing widespread gridlock. This leads to the famous Mini Cooper getaway scene.</p>
<p>From Saudi Arabia to South Africa, billions of dollars are being invested in smart city projects. Some researchers estimate that <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbits.blogs.nytimes.com%2F2015%2F06%2F10%2Ftraffic-hacking-caution-light-is-on%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640419072&amp;sdata=mJ1stfzCm67li7as92AvYyGp51DPeNi1Y2qYP7Tvk1A%3D&amp;reserved=0">spending on smart cities will reach $27.5 billion</a> by 2023. It makes protecting those cities reliant on technology from disruption ever more crucial.</p>
<p><strong>“WarGames” (1983)</strong></p>
<p>At the height of the Cold War, a young hacker (Matthew Broderick) <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nytimes.com%2F1983%2F06%2F03%2Fmovies%2Fwargames-a-computer-fantasy.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640429065&amp;sdata=8dIwy7Nj03Mfm8Bm67uQPXDoXCj0%2BATcKJoRgP2jRKg%3D&amp;reserved=0">breaks into a US military supercomputer</a> and comes close to starting a nuclear war. He thinks he’s playing a game based on a simulation, but this is not a drill.</p>
<p>According to a 2016 study by ISACA and RSA Conference, 74 percent of the world’s businesses expect to be hacked each year. And the economic loss due to cybercrime is estimated to reach $3 trillion by 2020.&nbsp; It is one of the reasons that Microsoft has called for a <a href="https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/#_ftn">Digital Geneva Convention</a> to help protect cyberspace in times of peace.</p>
<p><strong>“Sneakers” (1992)</strong></p>
<p><img class="wp-image-7718 size-full aligncenter" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/09/hacker-movies-that-have-an-echo-of-truth-1.jpg" alt="Sneakers" width="5435" height="3695"></p>
<p>This tech thriller, which spans from the late 1960s to the more computer-literate 1990s, boasts a heavyweight cast that includes Robert Redford and Sidney Poitier. A team of security specialists is approached by the NSA and <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nytimes.com%2F1992%2F09%2F09%2Fmovies%2Freviews-film-a-1970-s-caper-movie-with-heroes-of-the-time.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640439059&amp;sdata=YDz0WcqlS6cTIQK3eq1NuTptPC1Aub6SRsXuSadkbMY%3D&amp;reserved=0">commissioned to locate a mysterious black</a> box. This team, propelled into a world of espionage, is soon hunted by rogue agents. The box turns out to be the key to cracking all known encryption and is, the team realizes, too powerful to fall into the wrong hands.</p>
<p>In 1992, the idea that something could break all known encryption sounded scary and a little implausible. Today, the existence of such technology is more likely thanks to quantum computing.</p>
<p>According to Martin Giles of the MIT Technology Review, quantum computers are “a security threat that we’re still <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.technologyreview.com%2Fs%2F612509%2Fquantum-computers-encryption-threat%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640449054&amp;sdata=H6kH3eXPplEw7%2BrdklKIrqSTMO%2BeR6wzH3IqaJkeIZA%3D&amp;reserved=0">totally unprepared for</a>,” and it could be 20 years before cybersecurity catches up. Working closely with the United States National Institute for Standards and Technology, Microsoft is engaged with the development of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fresearch%2Fproject%2Fpost-quantum-cryptography%2F&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640449054&amp;sdata=9VSZJCeZAkxCnc8jzzZI4xEIR6lCMYkNUNgCHb9fQhE%3D&amp;reserved=0">post-quantum cryptography</a> that will be able to withstand quantum computer capabilities, while still working with existing protocols.</p>
<p><strong>“Hackers” (1995)</strong></p>
<p><img class="alignnone wp-image-7719 size-full" src="https://www.sickgaming.net/blog/wp-content/uploads/2019/09/hacker-movies-that-have-an-echo-of-truth-2.jpg" alt="Hackers" width="1371" height="960"></p>
<p>Starring Angelina Jolie and Jonny Lee Miller, “Hackers” is the story of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nytimes.com%2F1995%2F09%2F15%2Fmovies%2Ffilm-review-those-wacky-teen-agers-and-their-crazy-fads.html&amp;data=02%7C01%7CDhiya.Gerber%40microsoft.com%7Cc7e8ca60757041bfbe8c08d730eb5702%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637031659640459053&amp;sdata=sQGUu33g9oAKRjUEcgIYiqdLVeBIkWDsq6YewF7r850%3D&amp;reserved=0">a group of high school technology enthusiasts with codenames and complicated backstories</a>. They hack into the mainframe of an oil company and discover evidence of embezzlement — but their activities are soon detected.</p>
<p>Robust cybersecurity is important for businesses and to the future of national economies, and it has become a priority for governments around the world. The <a href="https://blogs.microsoft.com/on-the-issues/2018/04/17/34-companies-stand-up-for-cybersecurity-with-a-tech-accord/">Cybersecurity Tech Accord</a><em>, </em>announced by Microsoft in April 2018, is a public commitment among more than 100 global companies to protect and empower civilians online and help defend them against threats.</p>
<p><strong>“The Net” (1995)</strong></p>
<p>Sandra Bullock plays the lead role in this <a href="https://www.nytimes.com/1995/07/28/movies/film-review-do-you-exist-if-the-internet-erases-you.html">thriller</a> that foreshadows one worry of the modern security landscape: identity theft.</p>
<p>Admittedly, in 1995, many important records were still paper-based, after all. Still, this is one of the central themes in the plot: Can Angela Bennett (Bullock) overcome a series of interconnected threats and regain her identity?</p>
<p>Today, secure passwords are a must. There is a wealth of personal data stored digitally that can all too easily compromise the security of your identity.</p>
<p><em>Cyberspace has become a battlefield and powerful cyberweapons are being used against civilians. Tools and Weapons, by Microsoft President Brad Smith and Carol Ann Browne, looks at how the world can respond. To read more and pre-order the book, visit</em> <em><a href="https://news.microsoft.com/on-the-issues/tools-and-weapons">Tools and Weapons</a>.</em> <em>And follow <a href="https://aka.ms/AA5c3au">@MSFTIssues</a> on Twitter.</em></p>
</div>


https://www.sickgaming.net/blog/2019/09/...-of-truth/
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016