

Self-proclaimed ethical hacker Mel Bandison's life is turned upside down when she stops a data breach on a high-tech self-driving bus that also happens to shut down an international criminal network. She then becomes a target and is framed with a deepfake video that “shows” that she murders someone.

Robin
6.2Inspired by true life events, in the Oyo Empire in the 1940's, Elesin Oba, the king's chief horseman, succumbs to the lure of beauty and sexual desire on the very evening he is set to die in order to fulfil his lifelong debt of ritual suicide to accompany the dead Alaafin to the realm of the ancestors, he derails from a very important generational and spiritual transaction. This sets in motion a series of catastrophic consequences, in a spell-binding film of emotions, humour, and tragic role reversals that puts ancient beliefs and customs on trial in an ever increasingly post-modern and Western world.
6.0A group of friends stumble upon a mirror that serves as a portal to a "multiverse", but soon discover that importing knowledge from the other side in order to better their lives brings increasingly dangerous consequences.
6.3The exact details of what took place while Talib Ben Hassi was in police custody remain unclear. Police officers Jens and Mike are on routine patrol in Svalegården's ghetto when news of Talib's death comes in over the radio, igniting uncontrollable, pent-up rage in the ghetto's youth, who lust for revenge. Suddenly, the two officers find themselves fair game and must fight tooth and claw to find a way out.
5.9Using each other as alibis, two friends sneak off to indulge in secret affairs — but their elaborate web of lies unravels when one of them goes missing.
6.5Desperate for money and running out of options, Marine veteran Brian Brown-Easley holds several people hostage inside a bank, setting the stage for a tense confrontation with police.
6.0To escape a scandal, a bestselling author journeys to Scotland, where she falls in love with a castle -- and faces off with the grumpy duke who owns it.
5.8Feeling career burnout, pop star Angelina escapes to grant a young fan's wish in small-town New York, where she not only finds the inspiration to revitalize her career but also a shot at true love.
5.9Paolo needs to reach the castle of Alberto Caccia, where he was invited to spend Christmas with his family and Margherita, the ninth month of pregnancy. With them there will also be blessed, daughter of Alberto and childhood friend of Margherita, who was also pregnant. Among various mishaps and blunders, Paolo will combine another of his, coming to make everyone believe, because of a misunderstanding, that Alberto's died for his fault.
5.5Mary is a hit woman working for an organized crime family in Boston, whose life is completely turned around when she meets a young boy whose path she crosses when a professional hit goes bad.
7.2With his uncouth manner, Professor Pohl doesn’t enjoy the best reputation at the university where he works. To make matters worse, he makes a racist remark when student Naima arrives late for his lecture. Unfortunately for him, a video of his verbal outburst spreads like wildfire on the Internet, and the university’s president, Lambrecht, is called to deal with the incident. But Pohl is not dismissed. Instead, he is put to the task of helping Naima prepare for an important debating competition. The lecturer and the student could not be more different, yet they are thrown together to work as a team.
6.4Locked up for a minor crime, 19 year old JR quickly learns the harsh realities of prison life. Protection, if you can get it, is paramount. JR soon finds himself under the watchful eye of Australia's most notorious criminal, Brendan Lynch, but protection comes at a price.
5.9Telly Paretta is a grieving mother struggling to cope with the loss of her 8-year-old son. She is stunned when her psychiatrist reveals that she has created eight years of memories about a son she never had. But when she meets a man who has had a similar experience, Telly embarks on a search to prove her son's existence, and her sanity.
6.9At the tense 1938 Munich Conference, former friends who now work for opposing governments become reluctant spies racing to expose a Nazi secret.
6.9In Glasgow, Scotland, while a mysterious pandemic begins to spread around the world, Susan, a brilliant epidemiologist, falls in love with Michael, a skillful cook.
7.0Best friends Sophie and Agatha navigate an enchanted school for young heroes and villains — and find themselves on opposing sides of the battle between good and evil.
7.2After the Cold War, a breakaway Russian republic with nuclear warheads becomes a possible worldwide threat. U.S. submarine Capt. Frank Ramsey signs on a relatively green but highly recommended Lt. Cmdr. Ron Hunter to the USS Alabama, which may be the only ship able to stop a possible Armageddon. When Ramsey insists that the Alabama must act aggressively, Hunter, fearing they will start rather than stop a disaster, leads a potential mutiny to stop him.
6.7Desperate for income, Emily takes a shady gig buying goods with stolen credit cards supplied by a charismatic middleman named Youcef. Seduced by the quick cash and illicit thrills, they hatch a plan to take their business to the next level.
6.7Thirteen year old Sam Cleary suspects that his mysteriously reclusive neighbor Mr. Smith is actually the legendary vigilante Samaritan, who was reported dead 25 years ago. With crime on the rise and the city on the brink of chaos, Sam makes it his mission to coax his neighbor out of hiding to save the city from ruin.
7.7Paul Baumer and his friends Albert and Muller, egged on by romantic dreams of heroism, voluntarily enlist in the German army. Full of excitement and patriotic fervour, the boys enthusiastically march into a war they believe in. But once on the Western Front, they discover the soul-destroying horror of World War I.
7.1High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
5.1Max Kirkpatrick is a cop who protects Kate McQuean, a civil law attorney, from a renegade KGB team out to terminate her
6.8Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.
6.2Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
6.4Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
3.3After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
5.8State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
5.1The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
6.0A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
7.8Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
8.2Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
6.5Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
6.8The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
6.7When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
6.8A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
7.4The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
5.6During a routine prison work detail, convict Piper is chained to Dodge, a cyberhacker, when gunfire breaks out. Apparently, the attack is related to stolen money that the Mafia is after, and some computer files that somebody wants desperately to bury. The pair, who don't exactly enjoy each other's company, escape and must work together if they are to reach Atlanta alive. Luckily, they meet a woman who may be willing to help them.