Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
10 Movies All Security Pros Should Watch
Oldest First  |  Newest First  |  Threaded View
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
3/26/2019 | 3:26:21 PM
Added title
THE CUCKOO'S EGG - documentary on the epic battle an astronomer, Clifford Stoll, waged against a renegade intruder in Berkeley labs in CA many years ago - an insightful examination of security flaws embedded in the minds of military personnel who claim their systems ARE secure when the hacker is rampaging through and downloading files.  The book itself is fascinating and it was turned into a documentary.  Either one is a frightening tale for our time and much of it remains valid today.  (Passwords sent by email and written down) plus a unique flaw in Berkeley UNIX that permitted a system to spawn SUPERADMIN rights through a simple word processor akin to our NOTEPAD.  Definate to do - read or watch!

Steven Levy's HACKERS is also a great read about the birth of the community we live in starting in Route 128 in Boston through the Homebrew Computer Club and the emergence of Gates and Jobs.  Along the way we meet techs who lived for the DEC PDP-11 systems and Colossal Cave.  A different time, and maybe then not so different.
msims20701
100%
0%
msims20701,
User Rank: Apprentice
3/28/2019 | 1:37:51 PM
TRON (1982)
TRON - A 1982 walt Disney film staring Jeff bridges as Kevin Flynn a brilliant computer programmer who was fired from ENCOM turned hacker who teams up with two computer programmers from Encom Alan Bradly (Bruce Boxleitner) and Lora (Cindy Morgan) to recover his computer game programs that were stolen and missppropriated by his former boss Ed Dillinger now senior exec at ENCOM. When Flynn breaks into ENCOM he sarcastically states: "They never should have gotten rid of me" and latter Flynn encounters the MCP (Master Control program) which transports him inside a supercomputer into the digitized world of TRON.

Once there Flynn latter encounters two programs Yori5 and TRON to help TRON serach for and distroy the MCP and Sark (Command Program) so that Flynn can restore ownership to his video game programs, put Dillienger in jail and (spoiler alert) Flynn becomes the new exec at ENCOM. The movie briliantly combines live action with mostly computer animation for the entire three quarters of the film. The most interesting thing about this film is that the digital world of TRON mirrors the real world of Flynn where every program has a user. Flynn is Clu's user, Alan1 is TRON's user, Lora is Yori5's user and Dillinger is Sark's user.

This film also posses a very interesting question which may be somewhat apparent at the very end when day turns to night over the city before the credits roll: Are we humans just conscripts controlled by some type of master control program in the sky? Maybe as to paraphrase William Shakesphere: "The computer's a platform and all it's programs merley its systems."

Something for everyone to comtemplate since we humans are so dependent on our computers and other types of electronics. A lesson here for all companies from a security standpoint is before you fire any programmer or technician make sure you fully revoke all privilaged access both soft (passwords) and hard (access cards).   

 
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
3/28/2019 | 3:32:57 PM
COLOSSUS - THE FORBIN PROJECT
Now this is going a way back - a TV movie with Eric Stradden (if memory has that right) about a huge super-computer in America that talks to and befriends a companion in Russia.  The two, of course, decide that all humans need their supervision and assistance, stand down weapons to promote world peace with total dictatorial control of everything.  A very cautionary tale indeed about the sheer power of networks and, even then, when this was primitive stuff--- still holds true today.  

i would be remiss not to note down the power of the CRM114 device either - and true movie buffs know where that one came from.  (Back to the Future gives it a polite knod as well as Men in Black 3). 
jeffmaley
50%
50%
jeffmaley,
User Rank: Strategist
3/29/2019 | 6:37:56 PM
Lawnmower man??!
You should research this one a bit more. Only a small, unimportant part of the movie referenced the Stephen King short story. The producers used that to leverage it into a 'Stephen King' movie, which it is not. Not a bad flick, but has very little to do with King.
szurier210
100%
0%
szurier210,
User Rank: Moderator
3/29/2019 | 7:02:35 PM
Re: Lawnmower man??!
Thanks for your comment. I looked this up and you are right, Stephen King sued to have his name removed from the credits. Here's a link to some background of the lawsuit. This all happened in the 1990s, but thanks again for pointing this out, seems that Stephen King was upset by this because the movie The Lawnmower Man bore little or no resemblance to his short story. Take a look: https://ew.com/article/1994/04/22/stephen-king-wins-lawsuit/
nexus100
100%
0%
nexus100,
User Rank: Apprentice
4/3/2019 | 10:04:36 AM
Hackers?
Disappointed to not see Hackers on the list.  While the CGI was over the top and a bit ridiculous, the hacking aspects were really good. It was mostly social engineering to get passwords. Dumpster diving, shoulder surfing, and phone phreaking were all featured prominently. They also referenced a bunch of real-world reference books that were absolutely required reading for hackers during that time period. Not to mention highlighting the potential risks involved in computerizing control systems of large ships. Something that has recently been recognized again as a major risk with the potential to sink ships at sea.
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Moderator
4/7/2019 | 11:41:40 PM
Inside jokes
It is interesting to know how much info in certain movies that I have blatantly missed. I guess it really does take an insider to pick up the inside 'jokes'. Now that you've mentioned it all, those very movies seem good for a quick re-run.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4462
PUBLISHED: 2020-07-16
IBM Sterling External Authentication Server 6.0.1, 6.0.0, 2.4.3.2, and 2.4.2 and IBM Sterling Secure Proxy 6.0.1, 6.0.0, 3.4.3, and 3.4.2 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive i...
CVE-2019-4747
PUBLISHED: 2020-07-16
IBM Team Concert (RTC) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172887.
CVE-2019-4748
PUBLISHED: 2020-07-16
IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.
CVE-2020-14000
PUBLISHED: 2020-07-16
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code ...
CVE-2020-15027
PUBLISHED: 2020-07-16
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.