Feeds

Reality star Pratt shuns showbiz to be cybercrime superhero

A right tool for the job

Protecting users from Firesheep and other Sidejacking attacks with SSL

A star from the The Hills reality show has announced his supposed intention to take a break from his lucrative TV career in order to fight cybercrime.

Spencer Pratt, who recently appeared with drastically-enhanced wife and Hills co-star Heidi Montag in the US version of I'm a Celebrity, Get Me Out of Here!, reportedly hopes to team up with LA-based firearms training firm American Defense Enterprises to launch an infosec division.

Pratt, 26, claims he was inspired by a President Obama speech about the importance of protecting cyberspace in his decision to make a radical career shift from his "job" as a reality TV star and part-time rapper.

Suspicions abound that the move is a publicity stunt, especially because Pratt's claim that he were studying "software engineering with a focus on encryption" at USC were undermined when the University told Fox News he was not registered on campus this year. USC said Pratt was enrolled between 2003 and 2009 at the University, but that was for a course in political science.

To be fair, information security is a broad church and people with degrees in diverse areas - including philosophy and fine arts, as well as more traditional computer science backgrounds - have gone on to make huge contributions. The world of showbiz offers at least one precedent for Pratt's career shift. Hollywood star Robert Urich, star of PI drama Spenser for Hire, found moderate success in founding a laptop theft retrieval business in the '90s called CyberAngel.

Urich, however, had street cred, whereas Pratt plays the role of pantomime villain/hate figure in (mock) reality TV. His performances on talk shows such as Letterman (below) do not inspire much confidence that's he's up to the task of facing off against Russian and Chinese state-sponsored cybercrooks - but perhaps this is all just part of Pratt's act, and beneath the facade a keen mind is at work.

Frankly, though, judging from media interviews like this on Alex Jones' radio show, where Pratt witters on about New World Order conspiracy theories and the evils of birth control, we doubt it. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.