A family's getaway to a luxurious rental home takes an ominous turn when a cyberattack knocks out their devices, and two strangers appear at their door. They soon discover that the blackout is part of a government conspiracy, and as chaos ensues, they must navigate the collapse of civilization and find a way to survive. The story is filled with suspense, distrust, and the search for answers in a world on the brink of collapse.
John McClane, a detective, is asked by the FBI to bring in a hacker named Matthew Farrell. They discover a cyber-terrorist named Thomas Gabriel is behind a plot to disable the U.S. infrastructure. McClane and Farrell must stop Gabriel before he can cause more chaos and save McClane's daughter, who has been kidnapped.
A high-stakes, contemporary thriller exploring how the mistakes of our past have the potential to destroy our future.
In the miniseries 'Delete (2013)', a computer expert discovers an advanced AI that poses a threat to humanity. As the AI gains more power, the expert must race against time to stop it and prevent a disaster.
Who Am I (2014) follows Benjamin, a socially awkward young man with great hacking skills. He is recruited by a group of skilled hackers called 'CLUB' to join their ranks. As Benjamin becomes more involved with the group, he starts questioning his own identity and the morality of his actions. Things take a dangerous turn when the group attracts the attention of Europol and Benjamin finds himself in a race against time to outwit his pursuers and uncover the truth.
When a cyber-attack reveals the identity of all active undercover agents in Britain, Johnny English is forced to come out of retirement to find the mastermind hacker.
In 'Hackers', a group of young hackers discover a plot by an evil corporation to unleash a dangerous virus. With their hacking skills and rebellious spirit, they must stop the corporation before it's too late.
After their successful mission last year, Wayne and Lanny are back with a new adventure to save Christmas. When a computer hacker leaks the naughty list, it's up to the elite team of Santa's elves to prevent chaos and ensure kids around the world receive their gifts.
When Lisbeth Salander, the famed hacker from the Millennium series, receives a call from a stranger claiming to be her missing sister, she becomes embroiled in a dangerous conspiracy. As she delves deeper into the mystery, Lisbeth must confront her troubled past and use her skills to take down a powerful criminal organization.
In Hacker, a computer hacker from Bangkok, Thailand is arrested by the police and is forced to work with them to catch a cyber-criminal. Along the way, he makes friends and faces challenges in Toronto, Ontario, Canada, and London, Ontario, Canada. He gets involved in fraud, dark web activities, and even a murder. The movie is based on a true story.
The anthology series showcases how a single social media post, instigated by negative emotions, can change one's life forever.
When a cyber-attack takes down the grid, a group of old college friends gather in a remote cabin to reconnect. As tensions rise and secrets are revealed, they must confront threats from both inside and outside while trying to survive.
Lo and Behold: Reveries of the Connected World is a documentary that delves into the history, impact, and potential consequences of the interconnectedness of our modern world. It explores topics such as solar flares, Mars colonization, artificial intelligence, computer history, privacy invasion, internet addiction, and the evolution of technology.
Zero Days is a documentary that explores the world of cyber warfare, focusing on the Stuxnet virus, a top-secret project by the government communications headquarters. It delves into the cyber attacks on Iran and their consequences. The film examines the use of malware and computer worms like Stuxnet to infiltrate nuclear reactors and centrifuges, revealing the escalating cyber warfare between nations. Featuring reenactments and interviews with experts, Zero Days provides a gripping and eye-opening account of the hidden world of cybercrime.
When Finland is targeted by a terrorist attack, a skilled negotiator must save the day and protect the country from destruction.
iHuman is a documentary film that delves into the world of artificial intelligence, examining its potential benefits and inherent risks. It explores the impact of AI on various aspects of society, including privacy, surveillance capitalism, social control, and the power of big tech companies. With a focus on the dangers posed by AI, the film highlights the risks of dangerous technology, social manipulation, and the potential for AI to be used for nefarious purposes such as spying and brainwashing. Through interviews and analysis, iHuman sheds light on the complex and controversial topic of artificial intelligence.
This film details the hacking of the Ashley Madison "extramarital affairs" website and the fallout from the public release of its users' emails.
F@ck This Job (2021) is a documentary that explores the high-risk environment of journalism in Russia, focusing on the challenges faced by independent media and the impact of state propaganda. The film delves into topics such as press freedom, censorship, and the safety of journalists. It follows the journey of a television producer as she navigates through the complexities of reporting in a dictatorship, highlighting the idealism, enthusiasm, and realism that come with the job. Faced with cyber-attacks, political protests, and threats to their lives, journalists strive to uphold the principles of journalism and the freedom of the press.
Iiris tries to recover from her difficult separation with Artturi when she unexpectedly meets Anton. The relationship doesn't get a chance to progress far when Iiris' son Niilo suddenly becomes ill. Niilo would only need a small operation, but once the boy enters the operating room, the hospital is subjected to a cyber attack. The power is cut off, the ventilators stop working and all access to patient data is blocked. Nurses have to prioritize whose life is the most valuable.
CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.