“On the Line”: a movie about vishing
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
Spy droids, a phone hidden in a bag of chips, hacked traffic lights… No, this isn’t a random set of words, and we haven’t lost our minds: these are very real movie plotlines from famous directors.
At Kaspersky, we really love movies and, of course, never miss a chance to analyze them from a cybersecurity angle — even those that are far from the topic of cybersecurity. In this selection, you’ll find our best reviews to help you choose how to spend your Friday night.
If you’re into movies about hackers and cybercriminals, the blogposts below are for you. Some films show realistic attack scenarios, and do a great job as a Cybersecurity 101 textbook, while others simply charm the viewer with magical keyboard tapping. Take your pick:
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Many of our favorite thrillers, as well as spy and superhero movies, are a goldmine of useful (and harmful) cybersecurity advice. And although most of these films aren’t directly related to cybersecurity, you can still draw valuable lessons from them — for example, that a single bag of chips won’t save you from phone surveillance. Read more in our posts:
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
A look at what’s changed in the Matrix in the 18 years since the last update.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
These are our traditional cybersecurity reviews of the Star Wars universe. We talk about local infrastructure, technologies, and glaring mistakes: as you’ll see, sometimes even the most advanced corners of the Empire neglect basic security rules. Warning: the posts might contain spoilers!
More Star Wars reviews can be found here.
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Want to find more films? You can read other cybersecurity-themed reviews of movies and TV series here. Or if you prefer books over movies, find out how things are with cybersecurity in fairy tales around the globe.
Ransomware is a common and much-feared problem. Here are ten facts to help in dealing with it.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never made.