

For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
Narrator

For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
2022-05-16
0
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
Shocking documentary centering on victims of violent crime who seek to get revenge on their assailants.
7.2They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
5.8FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slam-dunking Southern granny with attitude to spare! Now this granny must play nanny to three dysfunctional upper-class kids in order to spy on their computer hacker father.
0.0Hacking at Leaves documents artist and hazmat-suit aficionado Johannes Grenzfurthner as he attempts to come to terms with the United States' colonial past, Navajo tribal history, and the hacker movement. The story hones in on a small tinker space in Durango, Colorado, that made significant contributions to worldwide COVID relief efforts. But things go awry when Uncle Sam interferes with the film's production.
7.2Milo is aging, he is planning his daughter's 25th birthday, and his shipment of heroin turns out to be 10,000 pills of ecstasy. When Milo tries to sell the pills anyway, all Hell breaks loose and his only chance is to ask for help from his ex-henchman and old friend Radovan.
2.5In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
0.0Jump onto the information superhighway with the Standard Deviants! Learn how to log on, surf the web and find everything you need in a matter of minutes!
0.0Based on the conversations Jösta Hagelbäck and Erik Ostlund had with Lars Kristiansson, a professor of information theory with data communication at Chalmers University in Gothenburg, Sweden. The talks took place at the difficult cancer sufferer Kristiansson's sick-bed and dealt with his insights in computer technology, his hopes and fears for the new technology, the role of religion, the history of mathematics, reasoning about algebra, analytic geometry and the fourth dimension, along with cultural outlooks over the Western society's lack of mysticism and spiritual values.
5.8Six high school seniors decide to break into the Princeton Testing Center so they can steal the answers to their upcoming SAT tests and all get perfect scores.
7.3Some 20 years ago, two sex workers were murdered in an upper-class Brussels neighborhood. Celebrated Belgian magistrate Anne Gurwez decides to revisit this cold case, pouring over the evidence with the use of new technologies and tracking down then-suspects.
8.3The race for supremacy in the age of artificial intelligence is on: between the USA, China and Europe. Between big tech companies and start-ups. Who will win the competition? Will Europe be left behind? And who will determine a technology that will shape the future of humanity?
8.3In order to turn their lives around, three taxi drivers living at the bottom rung of society hatch a plan to steal an invaluable art piece. Their plan was supposed to be perfect, but as coincidences pile up it becomes clear that nothing is going to go according to plan.
6.4Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
4.8Genius hacker and murderer Urano escaped from prison and fled to South Korea. Urano was hired by a South Korean anti-government organization to set a trap targeted for the Korea-Japan summit meeting. Sumin is assigned to watch over Urano but is intimidated by his frantic behavior. Urano distrusts her, but gradually their feelings begin to change a little.
0.0For centuries, rice farmers on the island of Bali have taken great care not to offend Dewi Danu, the water goddess who dwells in the crater lake near the peak of Batur volcano. Through an analysis of ritual, resource management practices (planting schedules, irrigation vs. conservation, etc) and social organization, anthropologist Steve Lansing and ecologist James Kremer discover the intricacy and sustainability of this ancient water management agricultural system.
8.0Sigurdur Thordarson, known as Siggi, becomes a hacker at 12, exposing Icelandic bank corruption at 14. Branded the "teenage whistleblower," he joins WikiLeaks in 2010, mentored by Julian Assange. Siggi leaks globally, but clashes with Assange, prompting him to spy for the FBI at 18. This tale weaves paranoia, hacking, and friendship, portraying Siggi's turbulent journey from trust to betrayal, revealing a heart-wrenching coming-of-age narrative.
6.0Angela Bennett is a freelance computer systems analyst who tracks down software viruses. At night she hooks up to the internet and chats to others 'surfing the net'. While de-bugging a new high-tech game for a cyber friend, she comes across a top secret program and becomes the target of a mysterious organization who will stop at nothing to erase her identity and her existence, in order to protect the project.
6.9Burned-out ex-baseball player Hank Thompson unexpectedly finds himself embroiled in a dangerous struggle for survival amidst the criminal underbelly of late 1990s New York City, forced to navigate a treacherous underworld he never imagined.
5.8State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.