Thriller
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
MOVIE COMMENTS
SIMILAR MOVIES
Pulse
The Girl Who Played with Fire
Dot.Kill
Who Am I
Elsewhere
Firewall
The Net 2.0
Hackers
Swordfish
Lawnmower Man 2: Beyond Cyberspace
Nicotina
Assassination Nation
Stay Alive
The Girl in the Spider's Web
Absolut
Cube 2: Hypercube
Nirvana
eXistenZ
Untraceable
The Cache
SIMILAR MOVIES
Pulse
IMDB 6.7 | Feb , 2001
In the immense city of Tokyo, the darkness of the afterlife lures some of its inhabitants who are desperately trying to escape the sadness and isolation of the modern world.The Girl Who Played with Fire
IMDB 7 | Sep , 2009
Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.Dot.Kill
IMDB 4.2 | Mar , 2005
Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.Who Am I
IMDB 7.6 | Sep , 2014
Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.Elsewhere
IMDB 5.8 | Jan , 2009
A teen girl disappears after trying to meet men online in order to escape her small town. Apparently, only her best friend worries enough to investigate the mystery.Firewall
IMDB 5.8 | Feb , 2006
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.The Net 2.0
IMDB 5.1 | Feb , 2006
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.Hackers
IMDB 6.4 | Sep , 1995
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.Swordfish
IMDB 6.3 | Jun , 2001
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.Lawnmower Man 2: Beyond Cyberspace
IMDB 3.3 | Jan , 1996
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.Nicotina
IMDB 6.6 | Oct , 2003
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.Assassination Nation
IMDB 6.3 | Sep , 2018
After an anonymous hacker begins leaking the private data of thousands living in a small American town, the townspeople spiral into madness, with four high school seniors at the center of the maelstrom.Stay Alive
IMDB 5.8 | Mar , 2006
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!The Girl in the Spider's Web
IMDB 6.1 | Oct , 2018
After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.Absolut
IMDB 7.8 | Apr , 2005
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…Cube 2: Hypercube
IMDB 5.5 | Apr , 2002
Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.Nirvana
IMDB 6.5 | Jan , 1997
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.eXistenZ
IMDB 6.8 | Apr , 1999
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.Untraceable
IMDB 6.2 | Jan , 2008
Special Agent Jennifer Marsh works in an elite division of the FBI dedicated to fighting cybercrime. She thinks she has seen it all, until a particularly sadistic criminal arises on the Internet. This tech-savvy killer posts live feeds of his crimes on his website; the more hits the site gets, the faster the victim dies. Marsh and her team must find the elusive killer before time runs out.The Cache
IMDB 5.5 | Apr , 2017
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?