Our comic book heroes (whether they are superheroes, or are villains) have transformed from paper to the big screen and now even to slots games. Obviously combining your love of comics with the thrill of playing slots is a sure-fire win (check out Paddy Power Games for the latest games). But did you know that as well as possessing a superpower, all of the following have an affiliation with gambling? Read on to find out more about your favourite comic book superheroes and villains.
We had to start with a classic comic character – okay so he might not be as well-known as some of the others on this list and certainly won’t be starring in a Hollywood blockbuster any time soon. However, he is coincidently named after one of the most popular casino games of all-time: blackjack.
Police Detective Jack Jones was a lover of blackjack and the story goes that he was lured into a small room by some mobsters and left (to probably die!) – but luckily, he had the ace of spades in his pocket. He used the card to escape and it then became his alter-ego. Of course, in true superhero style, he brought the crooks to justice in the end.
Another character with an alter-ego which coincidentally is a much-loved casino game is Roulette, also known as Veronica Sinclair who is a super-villainess. She is the granddaughter of Golden Age, who runs a casino.
Roulette runs a casino of sorts herself; however, ‘The House’ is used as an arena to stage fights between the superheroes which are captured, with the villains placing their bets on the outcome of each fight. Roulette was well-known for capturing most of the Justice Society and she is a genius when it comes to calculating odds and gambling winnings.
Batman’s nemesis may not be into gambling per se, but he had to be included given the fact he takes his name from one of the most iconic playing cards in the deck – the joker. He is also surely the greatest villain in comic book history, made even more legendary by Heath Ledger’s re-enactment in the 2008 hit The Dark Knight.
The way his mind works and the way he acts could be compared to several casino games, including roulette or poker, as he’s very unpredictable. He also commits his crimes in various intriguing ways – for example, his weapons of choice include razor-tipped playing cards and Joker Venom. The villain also adopted his name after his face was disfigured, causing him to resemble the intriguing playing card.
Another super-villain and this time the enemy of Spider-Man, Chance’s alter-ego is Nicholas Powell, a professional gambler. The name Chance came about as he enjoys leaving everything to chance and is a massive risk-taker.
He used his love of gambling to complete missions in order to receive payment –meaning if he was unsuccessful, he’d lose the bet and then need to pay the people who have hired him. Chance’s first run-in with Spidey saw him in a double-or-nothing bet to kill his target and the web-slinger.
Most of the names we’ve featured are of villains and Gambler is of no exception. He first appeared against Green Lantern and was one of the founding members of the original Injustice Society. He comes from a long line of gamblers and his alter-egos include Stephen Sharpe III and Stephen Sharpe V.
He adopted his name in memory of his grandfather and went on to become a criminal mastermind, robbing trains and banks. He also teamed up with Amos Fortune who’s the next and final name on our list.
Amos Fortune & Royal Flush Gang
Amos Fortune was obsessed with luck and he discovered the ‘luck glands’ which supposedly indicate the good and bad luck an individual possesses. He created the Royal Flush Gang, who battled the Justice League.
A reference to poker, the gang consisted of playing card villains under the names of King, Queen, Jack and Ten – and Amos Fortune as leader was Ace. The first gang was made up of clubs; the second set-up by Green Lantern was spades; and gradually the gang expanded to cover all four of the suits.
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
The Emerging Need for Social Media Security
By the time you’ve finished reading this sentence, nearly 700 passwords have been stolen from social media accounts across the world. Social media security breaches have the potential to cause up to $6 trillion in cybercrime damages by 2021, up from $3 billion in costs…
Which New Lorex Security Camera Is Right for Your Home?
Keeping your family and your possessions safe requires a proactive approach, and one way to protect what you care about is with a security camera system. Lorex Technology is well known for their security camera solutions, and their two newest products will change the way…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
GoPro Studio SUBSTITUTE — Try VideoProc to easily edit GoPro 4K videos
It’s a downright understatement to say that GoPro has changed the way we capture video content. If you’d to handle equipment big enough to fill a room for capturing quality content back in the old days, you can do the same using a simple-enough carriage…
Customer Credit: Great For Them But A Headache For You
In most B2B industries, trade credit is common practice. Customers come in expecting a certain amount of credit extended to them along with a healthy number of days before an invoice must be paid. Trying to buck that trend can mean missing out on growth….
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…