

When a hacker hired by a mysterious entity discovers that there is more than one party interested in the task he was assigned, not only will his job be at risk, but also his life.
El Hacker
El Espía
La Mano Derecha
El Informante
La Oportunista
El Anticuario
La Instructora
6.0Rivalling siblings must enlist the help of a remote Hacker to wage financial war against each others' businesses.
2.5In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
5.5Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
6.8A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
7.5Swedish thriller based on Stieg Larsson's novel about a male journalist and a young female hacker. In the opening of the movie, Mikael Blomkvist, a middle-aged publisher for the magazine Millennium, loses a libel case brought by corrupt Swedish industrialist Hans-Erik Wennerström. Nevertheless, he is hired by Henrik Vanger in order to solve a cold case, the disappearance of Vanger's niece
6.9A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
6.8Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.
6.3Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
5.8State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
5.1The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
0.0Armed with only a collection of cell phones and a unique talent, a hacker orchestrates an elaborate bank heist from an abandoned building. But when things spin out of control, she has her wits to hold it all together.
6.5Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
6.0A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
3.3After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
7.6Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
4.2Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.
7.0Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.
