The internet can be a scary place.
From phishing scams and identity theft to spyware and DDoS attacks, one must keep their data safe while navigating the internet, or you might get trapped in a scenario that reminds you of a terrifying horror movie.
To bring attention to these dangers, Surfshark has identified five chilling cybersecurity threats and created awareness posters in the form of horror movie posters!
More info: surfshark.com
1 Copycat (Alfred Hitchcock On Identity Theft)
Identity theft! On a psychoanalytic level, your identity is a soup of experiences, relationships, and desires. But when it comes to your financial security, your identity is a jigsaw puzzle of cut-and-pasteable names and numbers. When fraudsters crack your password or hack your system, it’s only a matter of time before they build a convincing replica ‘you’ and start spending in your name. The copycat-you could even sell your house!
Inspiration: Saul Bass’s iconic Vertigo poster was the inspiration for our cyber-era Hitchcock movie. In the original film, James Stewart falls in love with the doppelgänger of his dead lover, not realizing he is being played by unseen forces. Hitchcock was a master of the switched-identity twist. The ‘master of suspense’ had audiences covering their eyes in an era where blood and gore were minimal. One trick was to destabilize that most fundamental human value: the sanctity of identity.
2 Bait (Jordan Peele On Phishing)
’Phishing’ is a play on ‘fishing’ – criminals drop bait and wait for you to bite. That bait takes the form of a fake text message or email from your bank. Clicking the link may download malware to your device or take you to a spoof website where you feel comfortable ‘confirming your details.’ Either way, your credentials end up in the hands of bad people.
Inspiration: Everything is rosy in the opening moments of a Jordan Peele movie (Get Out, Us). So lovely that a genre audience already feels tense knowing the loveliness must be disrupted by murder and mayhem. But this is just one of the horror movie tropes that the contemporary filmmaker subverts. Because while classic horror launches a killer into the story from the outside, in Peele’s pictures the villain is closer – and more trusted – than you think.
3 The Eye (Ridley Scott On Facial Recognition)
Cybersecurity has always been an arms race. Hackers and innocent users deploy ever more sophisticated means to outwit each other. But what happens when the next battlefield is your face? With facial recognition technology, your features become biometric data. And anywhere this ‘data’ is visible (hello, Instagram), you cede precious ground in the battle for privacy and security.
Inspiration: It’s hard to pin Ridley Scott down to a style or set of thematic concerns. But if you had to, you couldn’t go far wrong with ‘dystopian retro-future where technology backfires.’ Blade Runner, in particular, is about who we see and how we see – and how machines might see us.
4 Pegasus Project (Eduardo Sánchez / Daniel Myrick On Spyware)
Can’t they come up with a better codeword for it? Spyware is software that hides on your device, and forwards text messages, passwords, location data, and even feeds from your camera and mic to a remote agent. Or spy. Crooks use this access to steal your identity or deliver precious data to advertisers and other agencies. And the Pegasus software developed by Israeli cyberarms firm NSO Group is alleged to have been used for surveillance on journalists and activists.
Inspiration: Are you old enough to remember when Blair Witch Project (1999) was the most important movie in the world? Sánchez and Myrick’s low-budget ‘found footage’ hit changed what was acceptable in cinema and horror. We reckon the folk-horror feel echoes the Greek myth inspiration behind Pegasus. And the night vision and time stamps of the 1990s camcorder effect remind us that your phone’s camera can tell a story – and you never know who might be watching.
5 Game Over (Edgar Wright On Ddos)
Distributed denial-of-service (DDoS) is what happens when hackers overwhelm a server or network with internet traffic, causing it to crash. When a rival gamer figures your IP, they can target your system and slow your connection – and your gaming aptitude – to a standstill.
Inspiration: All those fake requests flooding your server reminded us of the zombies and intergalactic androids swarming over the bookends of Edgar Wright’s Three Flavours Cornetto trilogy: Shaun of the Dead and The World’s End. Plus, Wright is known for his kinetic tributes to gaming and movie tropes. Finally, his characters all seem the type to, you know… be lazing around at home playing games when a DDoS attack drops in from nowhere to ruin their life.
No comments:
Post a Comment