

Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.


Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.
2018-11-08
8
4.7The narrator, "Barjo" (nutcase, crap artist), is an obsessive simpleton, given to filling his notebook with verbatim dialog, observed trivia, and oddball speculation on human behavior and the end of the world. When his house burns, he moves in with his twin sister, Fanfan -- an impulsive, quixotic egoist -- and her husband, Charles, the Aluminum King. Charles becomes the focus of the film, as his wife and brother-in-law bewilder him.
6.4A year after Amber helped Richard secure the crown. The two are set to tie the knot in a royal Christmas wedding — but their plans are jeopardized when Amber finds herself second-guessing whether or not she's cut out to be queen, and Richard is faced with a political crisis that threatens to tarnish not only the holiday season but the future of the kingdom.
6.5Po and the Furious Five uncover the legend of three of kung fu's greatest heroes: Master Thundering Rhino, Master Storming Ox, and Master Croc.
6.7Fear runs rampant throughout Tokyo with the revelation that demons in fact exist amongst us. Paranoia and the darker side of humanity boils onto the streets as people turn on one another, suspecting that anyone could in fact be a demon hiding in human clothing. Amidst the growing tensions, tragedy strikes Akira causing his mind to snap, retreating into his subconscious, allowing his Devilish alter-ego Amon to break free from Akira's cage of flesh and wreak havoc on both human and demons alike.
6.1This is yet another telling of the adventures of Tom Sawyer and Huckleberry Finn as the two try to clear their friend Jim of murder charges.
5.0When Daniel and Isabelle invite Patrick and his new flame, Emma, to dinner, it’s with some misgivings. After all, Patrick has just dumped his ex-wife — their best friend — to run off with a much younger woman. But when the ravishing Emma appears, all of Daniel’s qualms fly out of the window. He’s instantly smitten with the seductive woman...
6.7A mysterious extraterrestrial being resembling Godzilla rapidly approaches Earth. The monster, dubbed SpaceGodzilla, lands to challenge the King of the Monsters.
6.3Looking for a much-needed break, Finn arranges a surprise vacation for his friends Rey, Poe, Rose, Chewie, BB-8, R2-D2, and C-3PO, aboard the luxurious Halcyon. However, Finn's plan to have one last hurrah together quickly goes awry.
5.2The family is pleasantly surprised and puzzled when Beethoven suddenly becomes obedient. Turns out it's a prince and the pauper scenario, with the real Beethoven now living with a pompous rich family.
7.5Almost as soon as Jake and Cassie decide to get married on Christmas Eve, complications arise.
10.0A perfect ski vacation heads downhill in Winter Hollow, where any mention of Christmas unleashes the feared Headless Snowman. It's "A Scooby Doo Christmas" when Scooby-Doo and crew set out to melt the ferocious Frosty and save the holiday. It's no fun in "Toy Scary Boo" when all the toys in Happy Toyland start coming alive and wreaking havoc. In "Homeward Hound," a fiercely fanged cat creature petrifies the competing pooches at a dog show, including the visiting Scooby-Doo! Finally, Shaggy and Scooby-Doo's wildest dreams come true when they win a tour of Munchville, home of Scooby Snax dough and it spells out a "Recipe for Disaster."
4.3A series of bizarre murders. Psychometer Rinko cooperates with detectives in the investigation. The investigation is a difficult one, and the only clues are Rinko's visions when she is in ecstasy, and the crazy smile of a creepy man that appears vaguely.
7.7The first rule is that there are no rules. For the bare-knuckle combatants competing in Musangwe fights, anything goes - you can even put a curse on him. The sport, which dates back centuries, has become a South African institution. Any male from the age of nine to ninety can compete. We follow a group of fighters as they slug it out in the ring. Who will be this year's champion?
6.9Friends battle former U.S. presidents when they come back from the dead as zombies on the Fourth of July.
7.3The final film of the television series "The Adventures of Sherlock Holmes and Dr. Watson." It is based on the late and little-known stories of Arthur Conan Doyle, united by the theme of the approaching world war and the struggle of the legendary detective with foreign spies.
7.1Shipwreck survivors found on the presumably uninhabited Infant Island leads to a scientific expedition that discovers a surviving native population along with the Shobijin, tiny twin fairy priestesses of the island's mythical deity called Mothra. After the fairies are kidnapped by an exploitative businessman named Clark Nelson, Mothra sets out to rescue them.
9.1The documentary Merikotkan paluu (Return of the white-tailed eagle), tells the tale of the past and the present of the white-tailed eagle. The second protagonist of the film is the human - the animal that can be blamed for the eagles’ distress but also credited for its rescue.
5.4Dissatisfied with the dishonesty they see in dating, strangers Naima and Sergio make a pact to spend 24 straight hours together in an attempt to fast forward their relationship.
0.0Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
7.6Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
7.8This program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Through interviews with frontline personnel from the Department of Defense, NYPD’s computer crime squad, private detective firm Kroll Associates, X-Force Threat Analysis Service, and several notorious crackers, the program provides penetrating insights into the millions of hack attacks that occur annually in the U.S.—including one that affected the phone bills of millions and another that left confidential details of the B-1 stealth bomber in the hands of teenagers. The liabilities of wireless networks, the Code Red worm, and online movie piracy are also discussed. A Discovery Channel Production. (51 minutes)
5.0Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.
7.2TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.
7.5The documentary Pirat@ge traces the history of the Internet through the testimonies of those who built it: the hackers. It delves into the concerns of Generation Y, analyzing their networked communication methods, cultural consumption habits, and the sharing of such content.
8.0A small rural hospital in Japan battles an international cybercriminal gang that is holding them ransom with their stolen patient data.
6.5Werner Herzog's exploration of the Internet and the connected world.
6.3Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them.
7.8In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
7.6Global, dynamic, and eye-opening, this is story of the most daring cyber heist of all time, the Bangladeshi Central Bank theft, tracing the origins of cyber-crime from basic credit card fraud to the wildly complex criminal organisations in existence today, supported by commentary and fascinating insight from highly regarded cyber security experts.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
7.3Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.
0.0For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
6.9In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.
7.0CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.