Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
10 Movies All Security Pros Should Watch
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
NathanDavidson,
User Rank: Moderator
4/7/2019 | 11:41:40 PM
Inside jokes
It is interesting to know how much info in certain movies that I have blatantly missed. I guess it really does take an insider to pick up the inside 'jokes'. Now that you've mentioned it all, those very movies seem good for a quick re-run.
nexus100
nexus100,
User Rank: Apprentice
4/3/2019 | 10:04:36 AM
Hackers?
Disappointed to not see Hackers on the list.  While the CGI was over the top and a bit ridiculous, the hacking aspects were really good. It was mostly social engineering to get passwords. Dumpster diving, shoulder surfing, and phone phreaking were all featured prominently. They also referenced a bunch of real-world reference books that were absolutely required reading for hackers during that time period. Not to mention highlighting the potential risks involved in computerizing control systems of large ships. Something that has recently been recognized again as a major risk with the potential to sink ships at sea.
szurier210
szurier210,
User Rank: Moderator
3/29/2019 | 7:02:35 PM
Re: Lawnmower man??!
Thanks for your comment. I looked this up and you are right, Stephen King sued to have his name removed from the credits. Here's a link to some background of the lawsuit. This all happened in the 1990s, but thanks again for pointing this out, seems that Stephen King was upset by this because the movie The Lawnmower Man bore little or no resemblance to his short story. Take a look: https://ew.com/article/1994/04/22/stephen-king-wins-lawsuit/
jeffmaley
jeffmaley,
User Rank: Strategist
3/29/2019 | 6:37:56 PM
Lawnmower man??!
You should research this one a bit more. Only a small, unimportant part of the movie referenced the Stephen King short story. The producers used that to leverage it into a 'Stephen King' movie, which it is not. Not a bad flick, but has very little to do with King.
REISEN1955
REISEN1955,
User Rank: Ninja
3/28/2019 | 3:32:57 PM
COLOSSUS - THE FORBIN PROJECT
Now this is going a way back - a TV movie with Eric Stradden (if memory has that right) about a huge super-computer in America that talks to and befriends a companion in Russia.  The two, of course, decide that all humans need their supervision and assistance, stand down weapons to promote world peace with total dictatorial control of everything.  A very cautionary tale indeed about the sheer power of networks and, even then, when this was primitive stuff--- still holds true today.  

i would be remiss not to note down the power of the CRM114 device either - and true movie buffs know where that one came from.  (Back to the Future gives it a polite knod as well as Men in Black 3). 
msims20701
msims20701,
User Rank: Apprentice
3/28/2019 | 1:37:51 PM
TRON (1982)
TRON - A 1982 walt Disney film staring Jeff bridges as Kevin Flynn a brilliant computer programmer who was fired from ENCOM turned hacker who teams up with two computer programmers from Encom Alan Bradly (Bruce Boxleitner) and Lora (Cindy Morgan) to recover his computer game programs that were stolen and missppropriated by his former boss Ed Dillinger now senior exec at ENCOM. When Flynn breaks into ENCOM he sarcastically states: "They never should have gotten rid of me" and latter Flynn encounters the MCP (Master Control program) which transports him inside a supercomputer into the digitized world of TRON.

Once there Flynn latter encounters two programs Yori5 and TRON to help TRON serach for and distroy the MCP and Sark (Command Program) so that Flynn can restore ownership to his video game programs, put Dillienger in jail and (spoiler alert) Flynn becomes the new exec at ENCOM. The movie briliantly combines live action with mostly computer animation for the entire three quarters of the film. The most interesting thing about this film is that the digital world of TRON mirrors the real world of Flynn where every program has a user. Flynn is Clu's user, Alan1 is TRON's user, Lora is Yori5's user and Dillinger is Sark's user.

This film also posses a very interesting question which may be somewhat apparent at the very end when day turns to night over the city before the credits roll: Are we humans just conscripts controlled by some type of master control program in the sky? Maybe as to paraphrase William Shakesphere: "The computer's a platform and all it's programs merley its systems."

Something for everyone to comtemplate since we humans are so dependent on our computers and other types of electronics. A lesson here for all companies from a security standpoint is before you fire any programmer or technician make sure you fully revoke all privilaged access both soft (passwords) and hard (access cards).   

 
REISEN1955
REISEN1955,
User Rank: Ninja
3/26/2019 | 3:26:21 PM
Added title
THE CUCKOO'S EGG - documentary on the epic battle an astronomer, Clifford Stoll, waged against a renegade intruder in Berkeley labs in CA many years ago - an insightful examination of security flaws embedded in the minds of military personnel who claim their systems ARE secure when the hacker is rampaging through and downloading files.  The book itself is fascinating and it was turned into a documentary.  Either one is a frightening tale for our time and much of it remains valid today.  (Passwords sent by email and written down) plus a unique flaw in Berkeley UNIX that permitted a system to spawn SUPERADMIN rights through a simple word processor akin to our NOTEPAD.  Definate to do - read or watch!

Steven Levy's HACKERS is also a great read about the birth of the community we live in starting in Route 128 in Boston through the Homebrew Computer Club and the emergence of Gates and Jobs.  Along the way we meet techs who lived for the DEC PDP-11 systems and Colossal Cave.  A different time, and maybe then not so different.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file