Adam
Bona

2024-02-07
0
6.4Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
The explosive story of the world's most expensive heist, valued at $4.5Billion, and the real life lovebirds, hipsters, and wannabe rappers at its center.
5.1The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
6.3A computer specialist is sued for sexual harassment by a former lover turned boss who initiated the act forcefully, which threatens both his career and his personal life.
5.0When Demonetization (currency ban) is announced in India, 3 unlikely characters come face to face for a bag of cash. After that a car journey begins and some more characters come into picture. This results in a cat and mouse game with a very unexpected outcome.
0.0After coming under suspicion for a computer technician's murder, six hackers team up to try to find the real killer.
8.0A small rural hospital in Japan battles an international cybercriminal gang that is holding them ransom with their stolen patient data.
4.0Glenn wakes up to discover that his personal data has been leaked and is spreading virally all over the world.
7.6Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
5.8Six high school seniors decide to break into the Princeton Testing Center so they can steal the answers to their upcoming SAT tests and all get perfect scores.
2.5In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
8.0Digital advertising algorithms curate content precisely for users. Major tech firms claim to restrict disinformation yet still profit from harmful content, raising ethical concerns about democracy and online capitalism.
4.8Genius hacker and murderer Urano escaped from prison and fled to South Korea. Urano was hired by a South Korean anti-government organization to set a trap targeted for the Korea-Japan summit meeting. Sumin is assigned to watch over Urano but is intimidated by his frantic behavior. Urano distrusts her, but gradually their feelings begin to change a little.
6.0Angela Bennett is a freelance computer systems analyst who tracks down software viruses. At night she hooks up to the internet and chats to others 'surfing the net'. While de-bugging a new high-tech game for a cyber friend, she comes across a top secret program and becomes the target of a mysterious organization who will stop at nothing to erase her identity and her existence, in order to protect the project.
7.4Disgraced journalist Mikael Blomkvist investigates the disappearance of a weary patriarch's niece from 40 years ago. He is aided by the pierced, tattooed, punk computer hacker named Lisbeth Salander. As they work together in the investigation, Blomkvist and Salander uncover immense corruption beyond anything they have ever imagined.
8.3Four teenage slackers attempt a multi-million-dollar Bitcoin heist from their bedrooms, only to spiral into the darkest corners of the internet-and a danger beyond their computer screens.
6.4A chilling real-time thriller featuring a teenager, Casey, battling with an anonymous cyber-stalker.
7.0The high-profile case of serial killer Ludovic Chevalier has just gone to trial, and Kelly-Anne is obsessed. When reality blurs with her morbid fantasies, she goes down a dark path to seek the final piece of the case’s puzzle.
5.7France, a factory worker, lives with her three daughters in Dunkirk. The factory where she worked has been closed, leaving France and all of her workmates without a job. She decides to go to Paris to look for work. There she finds a cleaning job at the home of a rich man, Steve, whose world is radically different from her own. As their paths keep crossing, she discovers that her employer played a part in closing the factory in Dunkirk...
6.4Umesh, a loafer, leaves his home town and goes to Chennai to become a film-maker when his father asks him to manage their grocery store. A selfie that he takes in Chennai changes his life forever.