{"id":91872,"date":"2020-07-20T03:04:49","date_gmt":"2020-07-20T10:04:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91872"},"modified":"2020-07-20T03:04:49","modified_gmt":"2020-07-20T10:04:49","slug":"how-computer-security-is-depicted-in-movies-and-tv","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/","title":{"rendered":"How computer security is depicted in movies and TV"},"content":{"rendered":"<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600.jpg\" alt=\"\" width=\"1800\" height=\"1200\" class=\"aligncenter size-full wp-image-91916\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600.jpg 1800w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-300x200.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-1024x683.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-768x512.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-1536x1024.jpg 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-600-657x438.jpg 657w\" sizes=\"(max-width: 1800px) 100vw, 1800px\" \/><\/p>\n<p>On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of extremely lax security, the kind of <em>worst practice<\/em> that we constantly warn against. In the other, someone was hacked by a seemingly magical device that, just by its presence near a character&#8217;s computer, allowed another character to access the computer and copy files.<\/p>\n<p>For expediency, computer security and hacking tend to be portrayed unrealistically in movies and on TV, in part because realism would slow things down. But this depiction gives the wrong idea to users who watch these films and are influenced by what they see. Viewers expect verisimilitude in movies and TV shows, and directors and show runners often go to great lengths to present the world correctly (unless it&#8217;s a fantasy movie or TV series), through extensive use of consultants. But rarely is computer security depicted accurately.<\/p>\n<h3>The Good Liar (2019) and Focus (2015)<\/h3>\n<p><em>(Warning: minor spoiler alert)<\/em><\/p>\n<p>The first movie I saw recently was The Good Liar, with Ian McKellen and Hellen Mirren. McKellen plays a con man, and it quickly becomes obvious that he&#8217;s the one who is going to be conned by Mirren&#8217;s character. At one point, they agree to put their funds in a joint account\u2014\u00a32.7 million for one, and \u00a33.8 million for the other\u2014via some sort of tablet that the supposed bank in the Cayman Islands has provided to them, via a financial advisor (working with McKellen). The need a password, and one of the characters points to a painting on the wall, to suggest something easy to remember: lilies. A six-character, lowercase letters-only password. To protect \u00a36.5 million.<\/p>\n<p>The second movie was Focus, with Will Smith and Margot Robbie. This was another con-artist film, with both characters working together, then apart, then sort-of together again. At one point, Smith&#8217;s character gives Robbie&#8217;s character a necklace, and she takes it back to her hotel room and drops it in her suitcase. But, aha! This necklace contains a miniature device that hacks into her boyfriend&#8217;s computer, even though he&#8217;s using an advanced hardware device that changes its login password every 15 minutes. The device allows Smith&#8217;s character to access important data.<\/p>\n<p>Neither of these plot devices affect the plot&#8217;s apparent truthfulness, yet they present one very bad practice (the six-character password) and one nearly magical device. Of course, these examples are almost coherent, compared to some of the ideas seen in movies and on TV.<\/p>\n<h3>Passwords<\/h3>\n<p>One of the most ridiculous tropes of film hacking is what happens when criminals or hackers crack passwords, PINs, or digital bank safe locks. Some call this the &#8220;<a href=\"https:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/Main\/PasswordSlotMachine\">password slot machine<\/a>&#8221; trope. Passwords are not cracked like physical locks, where you can manually pick one tumbler at a time, but as whole units. There&#8217;s no way to figure out one character of a password at a time, since passwords themselves aren&#8217;t actually stored or validated this way. <a href=\"https:\/\/docs.oracle.com\/cd\/E26180_01\/Platform.94\/ATGPersProgGuide\/html\/s0506passwordhashing01.html\">Hashes<\/a>, which are the result of mathematical operations performed on passwords, are what is actually stored, and this makes it impossible to find the original password (or any individual characters therein) from the hash.<\/p>\n<h3>Hacking progress<\/h3>\n<p>When hackers try to crack a system or breach a firewall, there is always a way to know how much progress they&#8217;ve made, and how close they are to success, right? Movies and TV shows often display progress indicators when hackers are doing their deeds. They show the progress of a hack or breach as it is occurring, as if it is something that can be timed. These progress indicators display sometimes in a standard horizontal bar, like what you see when you&#8217;re installing software, and sometimes as numbers counting up or down. One example is this scene from the TV series Castle, where you can see progress percentages increase as the hack nears completion (along with many, many other hacking tropes).<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/K7Hn1rPQouU\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h3>Uploading viruses<\/h3>\n<p>Hackers often have to send code to other computers to crack them, and this process is rarely depicted realistically in film and television. A classic of bad movie hacking occurs in Independence Day, when Jeff Goldblum&#8217;s character uploads a virus from his PowerBook to the alien mothership. Of course, he was able to connect to the ship, understand its operating system, and create a virus that would work in spite of any protection it might have. Yes, the Aliens had Macs (or, at least, Mac-compatible alien tech).<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/EuQJd1rzres?start=32&amp;end=56\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<h3>Code on displays<\/h3>\n<p>Hacking is esoteric, so the way to portray it on film is to make it look complex and impenetrable. While it can be a complicated process, it&#8217;s nothing like what we are shown on computer displays in movies or TV shows.<\/p>\n<p>The random green characters on a black background in The Matrix, for example, are nothing more than a fancy screen saver. And when you see a hacker perform some command on a computer terminal, then a long flow of code display on the screen, that&#8217;s not at all what hackers actually see. Hackers do often use the command line, which returns text output, but nothing like the amount of code that typically displays on screen in films.<\/p>\n<p>In addition, the output depicted in entertainment media is often source code, or actual application code. Hackers may see text on screen, but it is generally utilitarian: it shows the results of a query, for example, with IP addresses, domain names, etc.<\/p>\n<p>Another common and comical effect, as shown below in a scene from NCIS, is when hundreds, even thousands of windows display on a screen. No hacker would be able to do anything with this morass of information.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/msX4oAXpvUE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Blockbusters need to make hacking look interesting, and in this scene from Skyfall, Q is analyzing a computer to try to thwart an attack. The display shows a wide variety of gobbledegook, including a very active visual of data points that slowly morphs into a diagram of the London Underground.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/aApTVqeGJMw?end=77\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<h3>Looking at hacking in movies and TV shows<\/h3>\n<p>In this Wired video, security researcher Samy Kamkar looks at 26 hacking scenes from movies and TV. He points out that some of them are realistic, but also highlights that that are ridiculous.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/SZQz9tkEHIg\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>If you&#8217;re interested in movies where hackers and cybersecurity feature as key plot points, this is <a href=\"https:\/\/cybersecurityventures.com\/movies-about-cybersecurity-and-hacking\/\">a comprehensive list<\/a>.<\/p>\n<h3>Learn how computer security really works<\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>On the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>, we often share practical tips on how to improve your own computer security posture, and we discuss the latest security and privacy news every week. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest news. And don&#8217;t forget to follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of extremely lax security, the kind of worst practice that we constantly warn against. In the other, someone was hacked by a seemingly magical device that, just [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":91915,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[63,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How computer security is depicted in movies and TV - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-20T10:04:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\",\"name\":\"How computer security is depicted in movies and TV - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage\"},\"datePublished\":\"2020-07-20T10:04:49+00:00\",\"dateModified\":\"2020-07-20T10:04:49+00:00\",\"description\":\"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How computer security is depicted in movies and TV\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How computer security is depicted in movies and TV\",\"datePublished\":\"2020-07-20T10:04:49+00:00\",\"dateModified\":\"2020-07-20T10:04:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage\"},\"wordCount\":1159,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg\",\"keywords\":[\"Hacking\",\"Security\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/","og_locale":"en_US","og_type":"article","og_title":"How computer security is depicted in movies and TV - The Mac Security Blog","og_description":"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-07-20T10:04:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/","name":"How computer security is depicted in movies and TV - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage"},"datePublished":"2020-07-20T10:04:49+00:00","dateModified":"2020-07-20T10:04:49+00:00","description":"On a recent weekend, I watched two movies, each of which used an element of computer security as a plot point. In one case, there was an example of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How computer security is depicted in movies and TV"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How computer security is depicted in movies and TV","datePublished":"2020-07-20T10:04:49+00:00","dateModified":"2020-07-20T10:04:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#webpage"},"wordCount":1159,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg","keywords":["Hacking","Security"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/07\/movies-hackers-400.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nTO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91872"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91872"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91872\/revisions"}],"predecessor-version":[{"id":91918,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91872\/revisions\/91918"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/91915"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}