{"id":40770,"date":"2015-01-20T12:55:36","date_gmt":"2015-01-20T20:55:36","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=40770"},"modified":"2025-08-17T20:03:08","modified_gmt":"2025-08-18T03:03:08","slug":"blackhat-movie","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/","title":{"rendered":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own"},"content":{"rendered":"<p>Director Michael Mann\u2019s cyber-thriller, <em>Blackhat, <\/em>opened in theaters this weekend, and promised to be the most <a href=\"https:\/\/www.wired.com\/2015\/01\/blackhat-the-best-cyber-movie\/\" target=\"_blank\" rel=\"noopener noreferrer\">realistic portrayal of cybersecurity<\/a> to date. So, of course, I just <em>had<\/em> to get down to my local theater and see it for myself.<\/p>\n<p>For those of you unfamiliar with the terminology, blackhat is a name derived from hacker slang for a person who hacks for personal gain or malicious reasons. The story focuses on former blackhat hacker, Nicholas Hathaway (played by <em>Thor\u2019s<\/em> Chris Hemsworth), who is recruited to investigate the deadly misdeeds of a \u2018super-hacker\u2019 plaguing both the FBI and the People\u2019s Liberation Army (PLA).<\/p>\n<p>The movie itself is OK. It\u2019s not bad. It\u2019s not great. Rather, it\u2019s just the kind of action mish-mash that\u2019s punctuated by the occasional gunfight, explosion and hyper-violence so common today. And to me, therein lies the film\u2019s biggest problem: it struggles for the most part to get past the gimmick.<\/p>\n<p>However, Hollywood has long needed a <a href=\"https:\/\/fusion.net\/story\/38341\/hackers-review-blackhat\/\" target=\"_blank\" rel=\"noopener noreferrer\">better depiction of hacking<\/a>. Previous attempts, like cult-classic, <em>Hackers<\/em>, paint today\u2019s largest national security concerns as the flamboyant tricks of the keyboard enacted by unrealistically eclectic personalities. This is not accurate. Nor is it the ethereal realm that <a href=\"https:\/\/youtu.be\/jeg_TJvkSjg\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Man<\/a> exists in. The very fact that <em>Blackhat<\/em> looks at hacking as a real thing with real-life consequences puts it miles ahead of Hollywood\u2019s other fantastical depictions of the cybersecurity industry.<\/p>\n<h2>Blackhat Pros and Cons<\/h2>\n<p><strong>So let\u2019s start with what <em>Blackhat<\/em> does right: <\/strong>it both explains and gives context to cybersecurity issues with considerable accuracy. Its overall premise, that a hacker can remotely cause a nuclear power plant to explode and manipulate stock exchanges, though a bit too cartoonishly evil, is solid. These things are indeed possible, and they have real life examples (though, thankfully, without nuclear radiation).<\/p>\n<p>Its depiction of how hackers operate\u2014that is, re-tooling older variations of malicious software, or <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a>, for other uses\u2014is also spot on. The movie gives reasonable explanations about malware programs, like Remote Admin Tools (called <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/blackshades-malware\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Access Tools<\/a> in the film\u2014but we\u2019ll let that one slide) a.k.a. RATs and how they can affect Programmable Logic Controllers (PLCs) that most everyone can understand. Even in this case, I think the producers used a RAT instead of the more likely <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-worm\" target=\"_blank\" rel=\"noopener noreferrer\">worm<\/a> because it had more Hollywood panache. However, there is a scene where a piece of malware, most likely a RAT, is controlling a camera in a restaurant.<\/p>\n<p><strong>Where the movie continues to miss the mark: <\/strong>is most glaringly in the discrepancies of how technical accuracies are implemented. For example, a single hacker causing a turbine to spin out of control and a nuclear power plant to explode tiptoes on the edge of being implausible. Destruction like that has been done (again, not on a nuclear explosion level), but it took a very specialized, likely state-sponsored malware called <a href=\"https:\/\/www.zdnet.com\/article\/breaking-news-ny-times-claims-us-released-stuxnet-with-israel-and-it-accidentally-escaped\/\" target=\"_blank\" rel=\"noopener noreferrer\">STUXNET<\/a> to do so. It is not something a single hacker could pull off without being detected first.<\/p>\n<p>Here\u2019s another example: our anti-hero (played by Hemsworth) needs to hack the National Security Agency (NSA) to repair a heavily damaged hard drive to find the criminal\u2019s location.<\/p>\n<p>He hacks the NSA through what\u2019s known as a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/spear-phishing-leaves-a-bloody-wound\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing attack\u2014<\/a>a targeted attack through email, often containing a malicious link or file. Posing as an NSA employee, he sends a .PDF document with a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-a-keylogger\" target=\"_blank\" rel=\"noopener noreferrer\">keylogger<\/a> payload to another mid-level employee who has access to the fictional \u2018repair program\u2019 he requires. There are a few things that are questionable with this premise, many of which have to do with the access the NSA would hypothetically allow to what is supposedly a \u2018super-secret memory repair system.\u2019<\/p>\n<p>Yet, the biggest complaint that I can levy against <em>Blackhat<\/em> by far is its depiction of time. It\u2019s disorienting. One moment you\u2019re in L.A., the next, Hong Kong, after that, Jakarta. It\u2019s hard for a viewer to get a grip on how long who is where. It neglects time as a crucial element in security. Sizeable hacks like those encountered in the film can take a long time to implement.<\/p>\n<p>In another example, our hero needs to hack into a bank\u2019s financial servers to do what he was ultimately sent to jail for: to steal money. He does so by using a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering attack<\/a>\u2014an approach that uses social networking sites, text messages and, like in the movie, physical USB keys to trick victims into giving access to a secure network\u2014on an on-duty security guard. Okay, that\u2019s reasonable. But again we run into a problem: just because you gained access to a PC stuffed under a security guard\u2019s desk does not mean you have immediate access to a bank\u2019s financial servers. In the real world, even a well-trained cyber army <a href=\"https:\/\/www.nytimes.com\/2015\/01\/19\/world\/asia\/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html?hp&amp;action=click&amp;pgtype=Homepage&amp;module=first-column-region&amp;region=top-news&amp;WT.nav=top-news\" target=\"_blank\" rel=\"noopener noreferrer\">takes months<\/a>, even years, to map and mine a massive network. And that\u2019s before they even think of attacking. In the film, the task took but a few hours.<\/p>\n<p>I could go on, but by now I think you get the point: Yes, the movie is technically correct in a lot of instances\u2014especially how hacking is used more as a forensic \u2018follow the breadcrumbs\u2019 tool than a mythical do-all\u2014but it misses the mark when it comes to the process of hacking. And hacking is very much a process.<\/p>\n<p>In truth, hacking is boring. It\u2019s wearisome. It takes time, lots of it. Hacking is powerful, but it is not magic.<\/p>\n<p>Regardless of the details above, I do like <em>Blackhat.<\/em> It raises awareness around a serious national security issue through the best medium possible, pop culture, and it does so in a responsible way. <em>Blackhat<\/em> is a refreshing take on an industry that\u2019s easily misunderstood. And really, that\u2019s all anyone can ask.<\/p>\n<p>Stay on top of the latest consumer and mobile security threats by following <a href=\"https:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">myself<\/a> and <a href=\"https:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> on Twitter, and Like us on <a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity&#8230;<\/p>\n","protected":false},"author":674,"featured_media":157253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[76,4452,4449,180,4185],"coauthors":[3973],"class_list":["post-40770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybercrime","tag-cybersecurity","tag-hacking","tag-malware","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-20T20:55:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T03:03:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own\",\"datePublished\":\"2015-01-20T20:55:36+00:00\",\"dateModified\":\"2025-08-18T03:03:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"keywords\":[\"cybercrime\",\"cybersecurity\",\"hacking\",\"malware\",\"Phishing\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\",\"name\":\"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"datePublished\":\"2015-01-20T20:55:36+00:00\",\"dateModified\":\"2025-08-18T03:03:08+00:00\",\"description\":\"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"width\":614,\"height\":300,\"caption\":\"typing codes to stop hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog","description":"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog","og_description":"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-01-20T20:55:36+00:00","article_modified_time":"2025-08-18T03:03:08+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own","datePublished":"2015-01-20T20:55:36+00:00","dateModified":"2025-08-18T03:03:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","keywords":["cybercrime","cybersecurity","hacking","malware","Phishing"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/","name":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","datePublished":"2015-01-20T20:55:36+00:00","dateModified":"2025-08-18T03:03:08+00:00","description":"Director Michael Mann\u2019s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","width":614,"height":300,"caption":"typing codes to stop hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blackhat-movie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=40770"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40770\/revisions"}],"predecessor-version":[{"id":220036,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40770\/revisions\/220036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/157253"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=40770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=40770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=40770"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=40770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}