Code Wars: America's Cyber Threat(2011)
Code Wars: Inside the Cyber Threat Cyber-criminals have brought the websites of the U.S. Department of the Treasury, the New York Stock Exchange, and the South Korean government to a halt. After hackers breached Sony’s PlayStation Network, the company reported that the personal information of 77 million of its customers – including their credit card data – was jeopardized. In China and Russia, cyber warriors are at the ready, poised to strike with the newest form of warfare, where conventional rules don’t apply.
Movie: Code Wars: America's Cyber Threat
Code Wars: America's Cyber Threat
HomePage
Overview
Code Wars: Inside the Cyber Threat Cyber-criminals have brought the websites of the U.S. Department of the Treasury, the New York Stock Exchange, and the South Korean government to a halt. After hackers breached Sony’s PlayStation Network, the company reported that the personal information of 77 million of its customers – including their credit card data – was jeopardized. In China and Russia, cyber warriors are at the ready, poised to strike with the newest form of warfare, where conventional rules don’t apply.
Release Date
2011-05-27
Average
0
Rating:
0.0 startsTagline
Genres
Languages:
EnglishKeywords
Similar Movies
0.0China und Wir(de)
China is pushing hard into German and European markets. Furthermore, Beijing is developing into an increasingly powerful military power. An investigative reporter team from BR, rbb, and SWR is investigating the impact this has on Germany's internal and external security.
0.0An Eye on You: Citizens Under Surveillance(en)
Do any areas of our lives escape surveillance any more? Citizens of the 21st Century are the focus of prying eyes, whether they agree to it or not.
6.8The Crazy Che(es)
The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.
7.0Hackers - Identity Theft(fr)
Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to hold it to ransom for their personal data. Companies, public bodies, schools and individuals have all become victims of cyber attacks. In this revealing documentary, victims tell how internet criminals have destroyed their lives
7.0TV5 Monde Incident Analysis(fr)
From: Symposium sur la sécurité des technologies de l'information et des communications. French conference on information security. It took place in à Rennes from the 7th to the 9th of June 2017.
0.0Project Bullyish(en)
The documentary explores online gang stalking formed through cults, cyber stalking, and online harassment.
0.0Intercept: A Century of Signals Intelligence(en)
A thought provoking documentary feature film providing a comprehensive exploration of the evolution of signals intelligence over the past century. Whether you're intrigued by the secretive world of intelligence agencies or concerned about the implications of digital surveillance, this film will leave you with a deeper understanding of the role signals intelligence plays in society.
0.0Do We Belong Here: The Triumphs and Struggles of Cybersecurity's Women(en)
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.
6.7The Wolf: True Alpha(en)
HP's latest entrant in "The Wolf" series once again pits Slater's character against The Fixer.
Stratagem(en)
CIA agent Stella Turner goes undercover to seduce and recruit enigmatic tech savant Daniel Sim, whose genius may be the key to stopping a catastrophic leak of U.S. defense secrets. But the tables turn fast: Daniel is no ordinary target — he’s a master manipulator with a secret of his own. As the line between ally and adversary blurs, seduction turns into full-blown psychological warfare, and Stella finds herself walking into a trap of global proportions.
4.2War of the Worlds(en)
Will Radford is a top analyst for Homeland Security who tracks potential threats through a mass surveillance program, until one day an attack by an unknown entity leads him to question whether the government is hiding something from him... and from the rest of the world.
5.5The Cache(nl)
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
4.0See Saw(en)
Glenn wakes up to discover that his personal data has been leaked and is spreading virally all over the world.
0.0Ata Kak - Time Bomb(en)
After Awesome Tapes From Africa's Brian Shimkovitz found the energetic, ecstatic music of Ghanaian musician Ata Kak, the tunes became beloved around the world. It was all unbeknownst to the artist himself -- his music was even unknown to those living in his hometown in Ghana. Years of tireless searching ensued, and eventually the Los Angeles-based label owner found a lead. Ata Kak - Time Bomb follows the search that Shimkovitz undertook as well as the visit to Ghana that took place once he found him. It is a celebration of great tunes and how, when it hits the right audience at the right time, music can touch people in a way that you never imagined.
0.0Deconstructing Supper - Is Your Food Safe(en)
Deconstructing Supper is a ride every contemporary eater will want to take, a thought-provoking and entertaining journey into the revolution in modern food production, and its effects on our lives.
0.0Death Makes Life Possible(en)
Anthropologist Marilyn Schlitz explores the mysteries of death.


