
A bank is hacked and the Security Operations Center manager goes back in time to change a critical decision he made that could change the course of a future breach that has taken down the entire bank.
Rootshell
Blair
Sam
Bullet
Shadow
5.5Aiming to defeat the Man of Steel, wealthy executive Ross Webster hires bumbling but brilliant Gus Gorman to develop synthetic kryptonite, which yields some unexpected psychological effects. Between rekindling romance with his high school sweetheart and saving himself, Superman must contend with a powerful supercomputer.
6.5A.D. 2400, DEVA's central council detects an incident of unauthorized access into their mainframe. Someone on Earth was trying to hack into the system. The only information DEVA was able to retrieve was that hacker referred to themselves as "Frontier Setter." To investigate the mysterious hacker's motives, the high officials of DEVA dispatch system Security Third Officer Angela Balzac to the Earth's surface. Equipped with a prosthetic "material body," Angela attempts to make contact with a local agent Dingo, but what awaited her instead was a swarm of Sandworms now infesting the Earth's surface. Angela intercepts the gruesome pests with her exoskeleton powered suit Arhan.
6.6When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
6.4The most dangerous former operative of the CIA is drawn out of hiding to uncover hidden truths about his past.
0.0Ferrari Thunderbird Taylor is getting ready to leave South Carolina behind forever and start a new life in the Queen City - until her deadbeat husband exchanges all their hard-earned money for cryptocurrency at the behest of a shadowy cult figure, known only as Ted. Before her new life can begin, Ferra must dismantle Ted's legion of Apocalypse-preppers, restore her husband's sanity, and salvage what's left of her good name.
10.0After witnessing the violent arrest of Ted Carter (Ethan N), Kit Porter (Henri L), a tech savvy baseball fan, uncovers a secret government conspiracy to watch over every citizen. After teaming up with Max Stone (Josh M) and Doug Reese (Charlie R), the crew try to take down the surveillance systems and restore privacy to the world. Nominated for multiple yo mama awards. Privacy Breach stands as a potent warning against surveillance, and begs an important question. How far will we go for law and order? After an emotional clip from the film went viral in 2020, directors everywhere looked towards this film for inspiration. Cited as "Your favourite film-makers favourite film", Privacy Breach tries, and succeeds, to tell a unique story that will remain unrivaled in the coming decades. 2020 is the new 1984. Privacy Breach. This aint yo daddys dystopian horror
5.1A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.
7.0Industrious high school senior Vee Delmonico has had it with living life on the sidelines. When pressured by friends to join the popular online game Nerve, Vee decides to sign up for just one dare in what seems like harmless fun. But as she finds herself caught up in the thrill of the adrenaline-fueled competition partnered with a mysterious stranger, the game begins to take a sinister turn with increasingly dangerous acts, leading her into a high stakes finale that will determine her entire future.
0.0Temporal agent Delta Star, a legendary hero from the future, arrives in our time to fight Cavemanoid, who came from the past and is capable of destroying the entire galaxy. However, defeating such a powerful enemy will not be easy...
5.5Champion gamer Jan has to fight for his digital identity, winning back his real life as well.
0.0A Chief Financial Officer for a large bank is hacked and has the secret pass-phrases to his personal cryptocurrency wallet compromised that holds $25 Million of his own money in it, which he needs for his daughter's heart transplant surgery. With intent on going after the bigger prize -- the bank he works for -- the hackers offer his personal money back in exchange for the password to the account containing $1 Billion of the bank's money.
0.0Chronicles the life of Widow, a female kingpin in the global underground of Ransomware-as-a-Service crime syndicates. It follows her group's rise to power to establish itself as the new polar power in the global Ransomware economy.
0.0Hacking at Leaves documents artist and hazmat-suit aficionado Johannes Grenzfurthner as he attempts to come to terms with the United States' colonial past, Navajo tribal history, and the hacker movement. The story hones in on a small tinker space in Durango, Colorado, that made significant contributions to worldwide COVID relief efforts. But things go awry when Uncle Sam interferes with the film's production.
3.3After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
7.2They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
5.1Max Kirkpatrick is a cop who protects Kate McQuean, a civil law attorney, from a renegade KGB team out to terminate her
6.4Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
