
A Chief Financial Officer for a large bank is hacked and has the secret pass-phrases to his personal cryptocurrency wallet compromised that holds $25 Million of his own money in it, which he needs for his daughter's heart transplant surgery. With intent on going after the bigger prize -- the bank he works for -- the hackers offer his personal money back in exchange for the password to the account containing $1 Billion of the bank's money.
Gabriel
Lorenzo Ricci
Evelyn
Belial
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
7.3Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.
5.9Genius hacker Connor discovers Cicada 3301, an online treasure hunt that could be a recruiting tool for a secret society. Soon Conner, art-expert friend Avi, and secretive librarian Gwen are dashing from graffiti sites to ancient libraries to uncover real-world clues. But they must outrun aggressive NSA agents, also hot on the trail of Cicada, who want the glory for themselves.
6.3Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
6.3Two rich children devise a way to escape their grandfather and visit their mother. Unfortunately for two hapless safe crackers, they become part of the plan.
6.0A U.S. Army Captain uses her years of tactical training to save humanity from sixteen nuclear missiles launched at the U.S. as a violent attack threatens her remote missile interceptor station.
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
5.8The story of a young writer's transformation when her past invades her present.
5.9A story centered on a transitional point in the life of Ave Maria Mulligan, the heart of her community in the Appalachian Mountains of Virginia.
6.5In a suburban landscape, the lives of several families interlace with loss, despair and personal crisis. Esther Gold has lost focus on all but caring for her comatose son, Paul, and neglects her daughter and husband. Lawyer Jim Train is devoted to his career, not his family. Helen Christianson wants to find a new spark in life, while Annette Jennings tries to rebuild hers.
6.1After losing everything in a cryptocurrency scam, a ragtag team of Redditors attempt to kidnap the kingpin who screwed them over.
6.0A group of top female agents from American, British, Chinese, Colombian, and German government agencies are drawn together to try and stop an organization from acquiring a deadly weapon to send the world into chaos.
6.1After learning that the death of his wife was not an accident, a former CIA Station Chief is forced back into the espionage underworld, teaming up with an adversary to unravel a conspiracy that challenges everything he thought he knew.
6.8Defiant young activists take the women's suffrage movement by storm, putting their lives at risk to help American women win the right to vote.
6.0An intelligent, lovable robot known as "F.R.E.D.I." is stolen from a secret research facility by the project's lead scientist. The robot is found by a 15 year old teenager, James. Soon the two begin to communicate and create a bond in which F.R.E.D.I. learns about teenage life and James learns about some new values.
6.4In order to be reinstated to the bar and recover custody of her daughter, a hotshot lawyer, now in recovery and on probation, must take on the appeal of a woman wrongfully convicted of murder.
6.2After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.
6.4A businessman, on his daily commute home, gets unwittingly caught up in a criminal conspiracy that threatens not only his life but the lives of those around him.
6.0On a road trip, Nic and two friends are drawn to an isolated area by a computer genius. When everything suddenly goes dark, Nic regains consciousness – only to find himself in a waking nightmare.
0.0Temporal agent Delta Star, a legendary hero from the future, arrives in our time to fight Cavemanoid, who came from the past and is capable of destroying the entire galaxy. However, defeating such a powerful enemy will not be easy...
5.3A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.
0.0Chronicles the life of Widow, a female kingpin in the global underground of Ransomware-as-a-Service crime syndicates. It follows her group's rise to power to establish itself as the new polar power in the global Ransomware economy.
6.6When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
5.5Champion gamer Jan has to fight for his digital identity, winning back his real life as well.
0.0Ferrari Thunderbird Taylor is getting ready to leave South Carolina behind forever and start a new life in the Queen City - until her deadbeat husband exchanges all their hard-earned money for cryptocurrency at the behest of a shadowy cult figure, known only as Ted. Before her new life can begin, Ferra must dismantle Ted's legion of Apocalypse-preppers, restore her husband's sanity, and salvage what's left of her good name.
0.0A bank is hacked and the Security Operations Center manager goes back in time to change a critical decision he made that could change the course of a future breach that has taken down the entire bank.
8.1In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
7.4In 2003, Harvard undergrad and computer programmer Mark Zuckerberg begins work on a new concept that eventually turns into the global social network known as Facebook. Six years later, Mark is one of the youngest billionaires ever, but his unprecedented success leads to both personal and legal complications when he ends up on the receiving end of two lawsuits, one involving his former friend.
4.9A young mad genius attempts to 'hack the human mind' in order to fix humanity.
4.1The USA is attacked by a large group of well organized terrorists who communicate through a computer network via satellite. A bunch of highschool kids has hacked the password and gained access. Believing it's a game they unknowingly cause terror acts all over the country. An anti-terror force fights against the terrorists.
4.3America's best player is being pulled in to the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's Most Wanted List, and is blackmailing him to take a part in a real twisted plan of world destruction. With just hours left, can the code be broken to save the world from total annihilation?
6.5This documentary reveals how a group of hackers powered the darkest corners of the internet from a Cold War-era bunker in a quiet German tourist town.
7.2Straight from the creators of the groundbreaking Matrix trilogy, this collection of short animated films from the world's leading anime directors fuses computer graphics and Japanese anime to provide the background of the Matrix universe and the conflict between man and machines. The shorts include Final Flight of the Osiris, The Second Renaissance, Kid's Story, Program, World Record, Beyond, A Detective Story and Matriculated.
Xeno, Christine, and Bivak spend their days and nights together in dimly lit rooms cast in the glow of shadows by their computer monitors. The subculture of LAN Parties, IM'ing and hacking confuse Xeno's parents as to why their son spends so much time behind the screen with his friends. The friends rally around Christine as it is discovered she has cancer. Christine's cancer goes into remission as the friends make a pact one night at a LAN Party. Convinced she'll be the first to go, Christine and the others make a promise that whoever dies first in the group will have the others place a webcam in their coffin so the world can watch their corpse.
6.8Kathiravan, a major in the Indian army with anger management issues, is compelled by circumstances to borrow a loan from a bank with false documents. When the entire money in the account vanishes, Kathiravan tries to track down the scamsters, and it leads him to White Devil, a master hacker.
0.0Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
7.4Disgraced journalist Mikael Blomkvist investigates the disappearance of a weary patriarch's niece from 40 years ago. He is aided by the pierced, tattooed, punk computer hacker named Lisbeth Salander. As they work together in the investigation, Blomkvist and Salander uncover immense corruption beyond anything they have ever imagined.

