“On the Line”: a movie about vishing
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
Spy droids, a phone hidden in a bag of chips, hacked traffic lights… No, this isn’t a random set of words, and we haven’t lost our minds: these are very real movie plotlines from famous directors.
At Kaspersky, we really love movies and, of course, never miss a chance to analyze them from a cybersecurity angle — even those that are far from the topic of cybersecurity. In this selection, you’ll find our best reviews to help you choose how to spend your Friday night.
If you’re into movies about hackers and cybercriminals, the blogposts below are for you. Some films show realistic attack scenarios, and do a great job as a Cybersecurity 101 textbook, while others simply charm the viewer with magical keyboard tapping. Take your pick:
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Many of our favorite thrillers, as well as spy and superhero movies, are a goldmine of useful (and harmful) cybersecurity advice. And although most of these films aren’t directly related to cybersecurity, you can still draw valuable lessons from them — for example, that a single bag of chips won’t save you from phone surveillance. Read more in our posts:
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
A look at what’s changed in the Matrix in the 18 years since the last update.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
These are our traditional cybersecurity reviews of the Star Wars universe. We talk about local infrastructure, technologies, and glaring mistakes: as you’ll see, sometimes even the most advanced corners of the Empire neglect basic security rules. Warning: the posts might contain spoilers!
More Star Wars reviews can be found here.
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Want to find more films? You can read other cybersecurity-themed reviews of movies and TV series here. Or if you prefer books over movies, find out how things are with cybersecurity in fairy tales around the globe.
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.
Kaspersky Internet Security and Kaspersky Total Security can help protect your privacy in a variety of ways including not allowing your webcam to serve as a spying device.
As a part of the Protect a Friend campaign, users can share an extended trial with their friends and get Kaspersky Internet Security free!