{"id":14595,"date":"2025-08-11T04:00:52","date_gmt":"2025-08-11T04:00:52","guid":{"rendered":"https:\/\/newestek.com\/?p=14595"},"modified":"2025-08-11T04:00:52","modified_gmt":"2025-08-11T04:00:52","slug":"security-infotainment-die-besten-hacker-dokus","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14595","title":{"rendered":"Security-Infotainment: Die besten Hacker-Dokus"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<div class=\"extendedBlock-wrapper block-coreImage\">\n<figure class=\"wp-block-image size-large\"><figcaption class=\"wp-element-caption\">\n<p class=\"foundryImageCaption\">Sie f\u00fchlen sich leer ohne Security-Dashboard? Diese Dokumentationen \u00fcberbr\u00fccken den Schmerz bis zum n\u00e4chsten Arbeitstag. <\/p>\n<\/figcaption><\/figure>\n<p class=\"imageCredit\"> Foto: Gorodenkoff \u2013 shutterstock.com<\/p>\n<\/div>\n<p>Wenn Sie in Ihrer Profession als Sicherheitsentscheider voll aufgehen, brauchen Sie m\u00f6glicherweise auch zwischen den Arbeitstagen ihre t\u00e4gliche Dosis Cybersecurity. Falls Ihnen die <a href=\"https:\/\/www.csoonline.com\/article\/3495593\/security-entertainment-die-besten-hacker-filme.html\" title=\"zahlreichen Ann\u00e4herungen Hollywoods an das Thema\" target=\"_blank\">zahlreichen Ann\u00e4herungen Hollywoods an das Thema<\/a> viel zu weit von der Realit\u00e4t entfernt sind, k\u00f6nnen Sie auf ein F\u00fcllhorn hochwertiger Dokumentationen zur\u00fcckgreifen. Die sind nicht nur informativ, (meist) sehr nah an der Realit\u00e4t und unterhaltsam, sondern teilweise auch historisch wertvoll und in einigen F\u00e4llen kostenlos in voller L\u00e4nge verf\u00fcgbar. <\/p>\n<h3 class=\"wp-block-heading\" id=\"doku-highlights-fr-sicherheitsentscheider\">Doku-Highlights f\u00fcr Sicherheitsentscheider<\/h3>\n<p>Nachfolgend haben wir diverse sehenswerte Dokumentationen in Zusammenhang mit Cybersecurity und Hacker-Kultur f\u00fcr Sie zusammengestellt. Viel Spa\u00df!<\/p>\n<p><strong>Hackers \u2013 Wizards of the Electronic Age (1985)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>fr\u00fche Doku \u00fcber die Hacker Community<\/p>\n<\/li>\n<li>\n<p>unter anderem mit Steve Wozniak<\/p>\n<\/li>\n<li>\n<p>kostenlos in voller L\u00e4nge verf\u00fcgbar<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Hackers - Wizards of the Electronic Age\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/zOP1LNr70aU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Hackers in Wonderland (2000)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>portr\u00e4tiert UK- und US-Hacker<\/p>\n<\/li>\n<li>\n<p>beleuchtet Hacktivismus<\/p>\n<\/li>\n<li>\n<p>kostenlos in voller L\u00e4nge verf\u00fcgbar<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Hackers in Wonderland (Complete)\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/FDQ3bps42fI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Secret History of Hacking (2001)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>fokussiert fr\u00fche Hacking-Techniken<\/p>\n<\/li>\n<li>\n<p>mit John Draper, Steve Wozniak und Kevin Mitnick<\/p>\n<\/li>\n<li>\n<p>kostenlos in voller L\u00e4nge verf\u00fcgbar<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"The Secret History of Hacking\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/PUf1d-GuK0Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Hackers Are People Too (2008)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>von Hackern kreiert<\/p>\n<\/li>\n<li>\n<p>will mit Stereotypen aufr\u00e4umen<\/p>\n<\/li>\n<li>\n<p>beleuchtet auch die Rolle der Frauen in der Community<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Hackers Are People Too (Trailer)\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/x3lrhCuofqw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>We Are Legion: The Story of the Hacktivists (2012)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>beleuchtet das Hacker-Kollektiv Anonymous<\/p>\n<\/li>\n<li>\n<p>zahlreiche O-T\u00f6ne von Mitgliedern und Experten<\/p>\n<\/li>\n<li>\n<p>auf diversen Filmfestivals ausgezeichnet<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"We Are Legion - Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/N0IDkzhBQMg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>DEFCON: The Documentary (2013)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>stellt das 20-j\u00e4hrige Jubil\u00e4um der Hacking-Konferenz DEFCON in den Fokus<\/p>\n<\/li>\n<li>\n<p>bis zu dieser Doku herrschte auf der Konferenz striktes Kameraverbot<\/p>\n<\/li>\n<li>\n<p>O-T\u00f6ne von Teilnehmern und Verantwortlichen<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"DEFCON Documentary Teaser Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/7s1j1cBw55E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Citizenfour (2014)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>thematisiert Edward Snowden und den NSA-Skandal<\/p>\n<\/li>\n<li>\n<p>enth\u00e4lt Interviews mit Snowden aus dem Jahr 2013<\/p>\n<\/li>\n<li>\n<p>entstand unter Beteiligung von Glenn Greenwald<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Citizenfour Official Trailer 1 (2014) - Edward Snowden Documentary HD\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/XiGwAvd5mvM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Digital Amnesia (2014)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>wirft ein Schlaglicht auf digitale Daten und den Umgang mit diesen<\/p>\n<\/li>\n<li>\n<p>mit Beteiligung von Experten des Internet Archive<\/p>\n<\/li>\n<li>\n<p>kostenlos in voller L\u00e4nge verf\u00fcgbar<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Digital Amnesia - VPRO documentary - 2014\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/NdZxI3nFVJs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Deep Web (2015)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>thematisiert den Darknet-Marktplatz Silk Road<\/p>\n<\/li>\n<li>\n<p>beleuchtet dabei auch die Verhaftung und den Prozess von Gr\u00fcnder Ross Ulbricht<\/p>\n<\/li>\n<li>\n<p>O-T\u00f6ne von zahlreichen Beteiligten<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Deep Web Official Trailer 1 (2015) - Documentary HD\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/BvC9oDlT8mM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>A Good American (2015)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>erz\u00e4hlt die Geschichte des Ex-NSA-Direktors Bill Binney<\/p>\n<\/li>\n<li>\n<p>kl\u00e4rt auf, wie ein Computerprogramm 9\/11 h\u00e4tte verhindern k\u00f6nnen<\/p>\n<\/li>\n<li>\n<p>Regie f\u00fchrte der \u00d6sterreicher Friedrich Moser<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"A GOOD AMERICAN von Friedrich Moser - 3sat Kulturzeit\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/-gV7a8HQwjc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>War for the Web (2015)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>wirft einen Blick auf die physische Infrastruktur hinter dem Internet<\/p>\n<\/li>\n<li>\n<p>zeigt, wie Unternehmen und Regierungen hinter den Kulissen um die Vorherrschaft k\u00e4mpfen<\/p>\n<\/li>\n<li>\n<p>beleuchtet dabei auch Fragen wie Data Ownership, Datenschutz und Security<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"War for the Web - Promo Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/aVwN5d2W7gg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Cyber War (2016)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>zeigt, wie Regierungen im Kampf gegen kriminelle Hacker aufr\u00fcsten<\/p>\n<\/li>\n<li>\n<p>dabei kommen auch unlautere Mittel wie Spionage zur Sprache<\/p>\n<\/li>\n<li>\n<p>viele prominente O-T\u00f6ne<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Cyber War | Trailer | Available Now\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/iqj39tw8z90?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Down the Deep Dark Web (2016)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>bietet Insider-Einblicke in das Darknet<\/p>\n<\/li>\n<li>\n<p>beleuchtet dabei auch legitime Einsatzzwecke<\/p>\n<\/li>\n<li>\n<p>will mit Vorurteilen und Stereotypen aufr\u00e4umen<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"DOWN THE DEEP, DARK WEB (OFFICIAL TRAILER)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/PWrXoippwP0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Zero Days (2016)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>erz\u00e4hlt die Geschichte des Stuxnet-Virus<\/p>\n<\/li>\n<li>\n<p>analysiert ausgiebig die Folgen des Angriffs<\/p>\n<\/li>\n<li>\n<p>bietet zahlreiche Insider-Einblicke und O-T\u00f6ne<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Zero Days Official Trailer 1 (2016) - Stuxnet Virus Documentary HD\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/7VgIayOpjEc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Facebook: Cracking the Code (2017)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>beleuchtet die Security-Kultur und -Probleme bei Facebook<\/p>\n<\/li>\n<li>\n<p>geht dabei auch auf die Nutzung von User-Daten, Ad-Gebahren und Fake News ein<\/p>\n<\/li>\n<li>\n<p>zahlreiche O-T\u00f6ne von Experten<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Facebook: Cracking the Code | Trailer | Available Now\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/pu_bI7DFp2M?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Kim Dotcom: Caught in the Web (2017)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>erz\u00e4hlt die Geschichte von Megaupload-Gr\u00fcnder Kim Schmitz<\/p>\n<\/li>\n<li>\n<p>beleuchtet dabei seinen Kampf gegen die US-Regierung und die Entertainment-Branche<\/p>\n<\/li>\n<li>\n<p>zahlreiche O-T\u00f6ne von Beteiligten \u2013 auch Kim selbst<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Kim Dotcom: Caught in the Web I Teaser Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/FHG6o0NXXVo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>The Defenders (2018)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>analysiert vier schlagzeilentr\u00e4chtige Cyberattacken<\/p>\n<\/li>\n<li>\n<p>nimmt dabei die Perspektive der Verteidiger ein<\/p>\n<\/li>\n<li>\n<p>produziert vom Sicherheitsanbieter Cybereason<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"The Defenders | Official Movie Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/nSPL9OF3sLU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>The Great Hack (2019)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>thematisiert den Skandal um Facebook und Cambridge Analytica<\/p>\n<\/li>\n<li>\n<p>nimmt dabei die Perspektive verschiedener Beteiligter auf<\/p>\n<\/li>\n<li>\n<p>aufw\u00e4ndig produziert<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"The Great Hack | Official Trailer | Netflix\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/iX8GxLP1FHo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>HAK_MTL (2019)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>kanadische Hacker stellen die Datenschutz-Versprechen von Unternehmen auf die Probe<\/p>\n<\/li>\n<li>\n<p>dabei liegt ein Fokus auf \u00dcberwachungstechnologien<\/p>\n<\/li>\n<li>\n<p>interessante Insider-Einblicke und O-T\u00f6ne<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"HAK_MTL Official Trailer: Meet the hackers fighting the War for Privacy on the internet\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/RVtqlW0pPLA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>WannaCry: The Marcus Hutchins Story (2019)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>erz\u00e4hlt die Geschichte des IT-Experten, der WannaCry durch Zufall stoppte<\/p>\n<\/li>\n<li>\n<p>und anschlie\u00dfend in Zusammenhang mit einem Banking-Trojaner verhaftet wurde<\/p>\n<\/li>\n<li>\n<p>dabei kommt auch Hutchins selbst zu Wort<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"WannaCry - The Marcus Hutchins Story Trailer\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ybRROaZRiRg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>KnowBe4: The Making of a Unicorn (2020)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>erz\u00e4hlt die Gr\u00fcndungsgeschichte des Security-Unternehmens KnowBe4<\/p>\n<\/li>\n<li>\n<p>mit Beteiligung von Chief Hacking Officer Kevin Mitnick<\/p>\n<\/li>\n<li>\n<p>produziert vom Cybercrime Magazine<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"KnowBe4: The Making Of A Unicorn. A Cybersecurity Story\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/W9UvWQJoRfE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>MY.DOOM: Earth\u2019s Deadliest Computer Viruses (2021)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>thematisiert den Computervirus MyDoom aus dem Jahr 2004<\/p>\n<\/li>\n<li>\n<p>analysiert dabei auch seine Auswirkungen<\/p>\n<\/li>\n<li>\n<p>kostenlos in voller L\u00e4nge verf\u00fcgbar<\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"MY.DOOM: Earth's Deadliest [Computer] Viruses\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/7kPNVKqSGz0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Biggest Heist Ever \u2013 Der gro\u00dfe Bitcoin-Raub (2024)<\/strong><\/p>\n<p>Kurz und knapp:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<p>thematisiert den Hackerangriff auf die Hong Konger Kryptob\u00f6rse Bitfinex aus dem Jahr 2016<\/p>\n<\/li>\n<li>\n<p>beleuchtet den Werdegang von Ilya Lichtenstein und Heather Morgan, die f\u00fcr den Angriff verurteilt wurden<\/p>\n<\/li>\n<li>\n<p>diverse O-T\u00f6ne von Ermittlern, Freunden, Betroffenen \u2013 und auch von Ilya Lichtenstein selbst <\/p>\n<\/li>\n<\/ul>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper youtube-video\">\n<iframe loading=\"lazy\" title=\"Biggest Heist Ever | Official Trailer | Netflix\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/4yzcg2rtMnI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<p><strong>Sie wollen weitere interessante Beitr\u00e4ge rund um das Thema IT-Sicherheit lesen? <\/strong><a href=\"https:\/\/www.csoonline.com\/de\/newsletters\/signup\/\" target=\"_blank\"><strong>Unser kostenloser Newsletter<\/strong><\/a><strong> liefert Ihnen alles, was Sicherheitsentscheider und -experten wissen sollten, direkt in Ihre Inbox.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sie f\u00fchlen sich leer ohne Security-Dashboard? Diese Dokumentationen \u00fcberbr\u00fccken den Schmerz bis zum n\u00e4chsten Arbeitstag. Foto: Gorodenkoff \u2013 shutterstock.com Wenn Sie in Ihrer Profession als Sicherheitsentscheider voll aufgehen, brauchen Sie m\u00f6glicherweise auch zwischen den Arbeitstagen ihre t\u00e4gliche Dosis Cybersecurity. Falls Ihnen die zahlreichen Ann\u00e4herungen Hollywoods an das Thema viel zu weit von der Realit\u00e4t entfernt sind, k\u00f6nnen Sie auf ein F\u00fcllhorn hochwertiger Dokumentationen zur\u00fcckgreifen. Die&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14595\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14595","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14595"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14595\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}