January 6, 2015 By Shane Schick 2 min read

There has probably been enough drama involving cybersecurity and the movies lately with the recent Sony Pictures hacking incident, but Hollywood will aim for more straightforward entertainment when it releases “Blackhat” the movie early next year.

Directed by Michael Mann and starring Chris Hemsworth of “Thor” fame, the film is being produced by Universal Pictures and will debut on Jan. 16, 2015. The story line involves the U.S. government’s decision to release a jailed computer genius to take on those responsible for a series of devastating hacking incidents against several high-profile targets.

Although the concept of “Blackhat” the movie may sound like an uncomfortable reminder of a recent move by cybercriminals to shut down computer systems and release confidential information from Sony Pictures, audiences have dealt with this kind of thing before. Variety magazine compared the situation to the release of a movie about nuclear war that came out in the late ’70s, just as a real-life meltdown of a reactor occurred in Pennsylvania.

As a story on Engadget points out, there has been a surprisingly long history of movies involving cybercriminals and government security threats, with one of the earliest ones dating back nearly 20 years ago. The concept of an ace programmer gone rogue who later becomes a quasi-superhero has also become a standard Hollywood archetype across not only movies, but TV shows, as well. In that sense, “Blackhat” the movie carries on a well-established tradition.

The real challenge, Gizmodo argues, is for people making these kinds of movies to aim for a certain timelessness. Given how quickly technology changes, what looks like a highly sophisticated cyberattack today might look quaint or difficult to even comprehend by more advanced audiences a few years from now. Based on the trailers, however, “Blackhat” the movie seems to look more like a traditional action film than something out of an IT security conference.

Even if Mann’s film turns out to be a flop, this won’t be the last time Hollywood turns to cybersecurity for inspiration. Tech Times notes that society’s increased dependence on IT will only make it more relevant as the subject for such stories. Who knows? Maybe the hot film of 2016 will be about security threats involving a smartwatch instead.

Image Source: Flickr

More from

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Q&A with Valentina Palmiotti, aka chompie

4 min read - The Pwn2Own computer hacking contest has been around since 2007, and during that time, there has never been a female to score a full win — until now.This milestone was reached at Pwn2Own 2024 in Vancouver, where two women, Valentina Palmiotti and Emma Kirkpatrick, each secured full wins by exploiting kernel vulnerabilities in Microsoft Windows 11. Prior to this year, only Amy Burnett and Alisa Esage had competed in the contest's 17-year history, with Esage achieving a partial win in…

Self-replicating Morris II worm targets AI email assistants

4 min read - The proliferation of generative artificial intelligence (gen AI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in gen AI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers. How the Morris…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today