“On the Line”: a movie about vishing
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
Spy droids, a phone hidden in a bag of chips, hacked traffic lights… No, this isn’t a random set of words, and we haven’t lost our minds: these are very real movie plotlines from famous directors.
At Kaspersky, we really love movies and, of course, never miss a chance to analyze them from a cybersecurity angle — even those that are far from the topic of cybersecurity. In this selection, you’ll find our best reviews to help you choose how to spend your Friday night.
If you’re into movies about hackers and cybercriminals, the blogposts below are for you. Some films show realistic attack scenarios, and do a great job as a Cybersecurity 101 textbook, while others simply charm the viewer with magical keyboard tapping. Take your pick:
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Many of our favorite thrillers, as well as spy and superhero movies, are a goldmine of useful (and harmful) cybersecurity advice. And although most of these films aren’t directly related to cybersecurity, you can still draw valuable lessons from them — for example, that a single bag of chips won’t save you from phone surveillance. Read more in our posts:
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
A look at what’s changed in the Matrix in the 18 years since the last update.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
These are our traditional cybersecurity reviews of the Star Wars universe. We talk about local infrastructure, technologies, and glaring mistakes: as you’ll see, sometimes even the most advanced corners of the Empire neglect basic security rules. Warning: the posts might contain spoilers!
More Star Wars reviews can be found here.
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Want to find more films? You can read other cybersecurity-themed reviews of movies and TV series here. Or if you prefer books over movies, find out how things are with cybersecurity in fairy tales around the globe.
A software update can be costly if your computer does it when connected to the Internet over cellular. Here is how to avoid it.
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Some things we routinely do in the office are dangerous for careers as they pose significant risk to the company’s business. It’s equally relevant for CEO and intern alike, so watch out!
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?