Careers & People

2/28/2018
02:30 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.
2 of 9

Mr. Robot
The popular series from USA Network has been hailed by the hacking community and the tech media as the most realistic depiction to date of how hackers think and operate. Most TV shows often resolve research and hacks inside of 30 seconds, but Mr. Robot delves into how intricate hacking is and portrays the depth of research and patience it takes to execute a hack. Plus, the show is full of suspense and long on social commentary. TV critics expect the fourth series to start later this fall.

Watch trailer: https://www.youtube.com/watch?v=EMK5e-FSro0

Image Source: Shutterstock via stock_photo_world

Mr. Robot

The popular series from USA Network has been hailed by the hacking community and the tech media as the most realistic depiction to date of how hackers think and operate. Most TV shows often resolve research and hacks inside of 30 seconds, but Mr. Robot delves into how intricate hacking is and portrays the depth of research and patience it takes to execute a hack. Plus, the show is full of suspense and long on social commentary. TV critics expect the fourth series to start later this fall.

Watch trailer: https://www.youtube.com/watch?v=EMK5e-FSro0

Image Source: Shutterstock via stock_photo_world

2 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7682
PUBLISHED: 2018-06-22
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
CVE-2018-12689
PUBLISHED: 2018-06-22
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.