Main cast Stefanie van Leersum; Nasrdin Dchar; Thomas Hoppener; Roos Ouwehand; Alex Hendrickx
Genres Thriller
Description Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isnât the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
When Delhi Police comes across an unusual case revolving around hacking they seek help of an expert who thinks like them only to come across a lazy hacker Mickey Arora.
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
Two thieves, a magician, a computer hacker, a wannabe actor and a explosives expert plan a robbery to fulfill the dream of Victor Braganza. Will they be successful or will destiny have something different for them?
A man is released from prison to help American and Chinese authorities pursue a mysterious cyber criminal. The dangerous search leads them from Chicago to Hong Kong.
John McClane is back and badder than ever, and this time he's working for Homeland Security. He calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
Hacker's Game is a love story between two hackers, Soyan and Loise. Like many other hackers, Soyan works for a company he previously hacked. This "online security" firm runs covert activities for high-profile clients around the world. Loise is a cyber-detective who investigates war crimes for a human rights organization. Obsessed with the truth, she also has spent years searching for an unknown person. The two hackers meet on a rooftop and bond together through a virtual chess game. But Soyan's employer, Russell Belial, has asked him to protect the same arms-dealer that Loise is determined to help to capture. Who will call the game now? What is Soyan's real goal? The pair embarks upon an intense but dangerous romance, playing an elaborate game of deception. After being in a virtual world, will Soyan and Loise risk everything for true love?
Thomas A. Anderson is a man living two lives. By day he is an average computer programmer and by night a malevolent hacker known as Neo, who finds himself targeted by the police when he is contacted by Morpheus, a legendary computer hacker, who reveals the shocking truth about our reality.
Hackers Wanted is an unreleased American documentary film. Directed and written by Sam Bozzo, the film explores the origins and nature of hackers and hacking by following the adventures of Adrian Lamo, and contrasting his story with that of controversial figures throughout history. The film is narrated by Kevin Spacey.
This English-language adaptation of the Swedish novel by Stieg Larsson follows a disgraced journalist, Mikael Blomkvist, as he investigates the disappearance of a weary patriarch's niece from 40 years ago. He is aided by the pierced, tattooed, punk computer hacker named Lisbeth Salander. As they work together in the investigation, Blomkvist and Salander uncover immense corruption beyond anything they have ever imagined.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
When their computer hacker friend accidentally channels a mysterious wireless signal, a group of co-eds rally to stop a terrifying evil from taking over the world.
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking "black box" from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his "sneakers" must save themselves and the world economy by retrieving the box back from their blackmailers.
Three college students on a road trip across the Southwest experience a detour â the tracking of a computer genius who has already hacked into MIT and exposed security faults. When the trio find themselves drawn to an eerily isolated area, suddenly everything goes dark. When one of the students regains consciousness, he finds himself in a waking nightmare.
After taking a bullet to the head, Salander is under close supervision in a hospital and is set to face trial for attempted murder on her eventual release. With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander must prove her innocence. In doing this she plays against powerful enemies and her own past.
Samuel works in Brussels as a pharmaceutical delivery man. His gorgeous girlfriend Mireille heads off to New York to intern at a prestigious architecture firm. Shortly after her departure, Sam's computer is hacked. A series of rather dodgy IT-guys fail to protect his wireless network. The mysterious hacker seems intent on screwing up Samuel's life and his relationship with Mireille. Paranoia kicks in. Sam starts to suspect his neighbors and gets obsessed with WiFi-rays... Love, paranoia and two lovers separated by an ocean of communication devices.
A look at the relationship between WikiLeaks founder Julian Assange and his early supporter and eventual colleague Daniel Domscheit-Berg, and how the website's growth and influence led to an irreparable rift between the two friends.
The sequel to the low budget first film âCube.â This time the prisoners find them selves in a more advanced cube environment that they must escape from before they are killed. A science fiction film where space and time have more than one path.
In Stockholm, Sweden, hacker Lisbeth Salander is hired by Frans Balder, a computer engineer, to retrieve a program that he believes it is too dangerous to exist.
A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
High School student David Lightman (Matthew Broderick) has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Defense Department's war computer and initiates a confrontation of global proportions! Together with his girlfriend (Ally Sheedy) and a wizardly computer genius (John Wood), David must race against time to outwit his opponent...and prevent a nuclear Armageddon.
Nick is excited to discover that he's won a dinner date with his favorite actress, Jill Goddard. But when Jill refuses to honor the contest, he receives an offer he can't refuse: the ability to view Jill secretly via computer. Nick begins watching the unknowing star on her webcam, not realizing that this decision will put both himself and Jill at risk as they enter a terrifying world of cat-and-mouse where nothing-and no one-are as they seem.
Two young women arrive at a curious penthouse apartment, led by one's crush on her tutor. However, her love interest doesn't live alone. He's part of a trio of computer hackers about to embark on the ultimate job on the world's most mysterious mainframe. Whilst doing so, they unlock more than they bargain for with supernatural and ultimately fatal results. Can this seemingly insignificant chain of events, which have thrown this group together, be construed as fate? Can the beacon provide a signal of hope or is it a web of manipulation, paranoia and ultimately... murder?
After a tragic accident Luke Gibson is left with critical injuries and complete amnesia. A new technological breakthrough from the Hexx Corporation - a Psi-Comp Implant that's hardwired into Luke's brain - saves his life, but Luke soon finds out that this new technology comes with a price and that the Hexx Corporation harbors sinister plans for the new device.
Computer hacker Will Farmer (Lanter) engages a government super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain software glitches have in turn made him become paranoid.
FAA system analyzer named Neil McCabe is the only person who seems to have this different hunch towards a group of international terrorists after a horrific plane incident occured. He thinks that an evil genius computer hacker sets out and manipulate the computer electronical system which linked to several airplanes to cause destruction and tragedy. In order to prevent the mishap, McCabe and his teammate, Rudy, finds out about the machine used by the criminals which leads them to a psychotic thrilling fight between the terrorist.
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
A former sailor who has served prison sentences for alcohol smuggling fights to keep his family afloat. He is offered pay for a last tour of cargo between Reykjavik and Rotterdam. He agrees, in the hope to get out of debt, but unexpected events occur.
Set in the 1970s London during the height of the Cold War when a young spy discovers the disturbing truth about his father's complex past. Based on Alan Judd's 2001 novel Legacy, the second in the Thoroughgood series after 1981's A Breed Of Heroes (adapted by the BBC in 1994).
As the three day week, petrol rationing and industrial strife plunge Britain into a state of emergency, MI6 trainee spy Charles Thoroughgood is asked to reconnect with an old university friend, Russian diplomat Viktor Koslov, with a view to 'turning' him. Viktor has his own agenda, though, and reveals a shocking truth about Charles's own family that threatens to derail him, both personally and professionally.
He is catapulted into a dangerous personal odyssey to uncover the truth but finds himself drawn into a lethal KGB plot to mount an attack within the UK. His life is further complicated by a relationship with the wife of another agent, which forces him to realise that betrayal can take many forms.
Martine offers Terry a lead on a foolproof bank hit on London's Baker Street. She targets a roomful of safe deposit boxes worth millions in cash and jewelry. But Terry and his crew don't realize the boxes also contain a treasure trove of dirty secrets - secrets that will thrust them into a deadly web of corruption and illicit scandal.
While on a GPS treasure hunt in the Palatinate forest four teenagers come across an old US military radio tower station. Back in the days of the Cold War it was part of a secret military program that produced horrific side effects, but has long since abandoned. Until now, when the station is mysteriously powered up again.
A young woman studying the habits of webcam chat users from the apparent safety of her apartment witnesses a brutal murder online and is quickly immersed in a nightmare in which she and her loved ones are targeted for the same grisly fate as the first victim.
Set just before the fall of the Berlin Wall in 1989, Sgt. Ray Elwood is an American soldier stationed at a German army camp. A soldier because a judge gave him a choice between the army and jail, Ray spends much of his free time cooking cocaine for the MPs. When a soldier dies and a toxicology screen shows an alarming level of illegal narcotics, someone is sent in to investigate.
Kevin Burke a young executive for a multinational investment bank, is a rising star in the Rotterdam office. Rewarded for his perceptive eye and mastery of foreign languages, Kevin receives the promotion he has been working for - a coveted spot on the company's internal security team. Trained by the enigmatic Mr. Ficks to protect the firm's employees in volatile, third world markets, Kevin thinks he has a shield for every arrow. And this makes him feel safe, or at least "safer" than he's felt since his father's mysterious death. Karl Jorgensen, the Managing Director of the bank, is Kevin's boss and surrogate father. He has mentored Kevin over the years, which makes his biological son, Karl Jorgensen Junior, visibly jealous. Jorgensen brushes off the "sibling rivalry", but clearly favors Kevin, molding him into a confident, young man. It is this confidence that gives Kevin the courage he needs to propose to the woman he loves...
Notorious hacker Drew Reynolds is captured by the CIA and given a proposition - work for them or spend the rest of his life in prison. Agreeing on the condition that he can form his own team, he puts together a group of "throwaways" - the people deemed expendable and seemingly the worst in the organization.
An efficient gang enters a Manhattan bank, locks the doors, and takes hostages. They work deliberately, without haste. Detective Frazier is assigned to negotiate, but his mind is occupied with the corruption charges he is facing. With an army of police surrounding the bank, the thief, the cop, and the plutocrat's fixer enter high-stakes negotiations. Why are the robbers asking for a plane, if they are so competent and they know they won't get one? Why aren't they in more of a hurry?
In an attempt to make some extra cash while away at College, Kylie moves into a house that streams content to an X-rated website. After a deranged fan hacks in to determine the house's location, she finds herself in a terrifying fight for her life.
Joanna Crane lives a double life. During the day she works as fashion designer but during the night she is the high class prostitute China Blue. As she is accused for industrial spying, Bobby Grady is hired to shadow her. However, they fall in love. Meanwhile a psychopathic preacher starts stalking her.
Zed (Eric Stoltz) is an American vault-cracker who travels to Paris to meet up with his old friend Eric (Jean-Hugues Anglade). Eric and his gang have planned to raid the only bank in the city which is open on Bastille day. After offering his services, Zed soon finds himself trapped in a situation beyond his control when heroin abuse, poor planning and a call-girl named Zoe all conspire to turn the robbery into a very bloody siege.
With the disappearance of hack horror writer Sutter Cane, all Hell is breaking loose...literally! Author Cane, it seems, has a knack for description that really brings his evil creepy-crawlies to life. Insurance investigator John Trent is sent to investigate Cane's mysterious vanishing act and ends up in the sleepy little East Coast town of Hobb's End.
It's been 10 years since John Connor saved Earth from Judgment Day, and he's now living under the radar, steering clear of using anything Skynet can trace. That is, until he encounters T-X, a robotic assassin ordered to finish what T-1000 started. Good thing Connor's former nemesis, the Terminator, is back to aid the now-adult Connor ⦠just like he promised.
A man who specializes in debunking paranormal occurrences checks into the fabled room 1408 in the Dolphin Hotel. Soon after settling in, he confronts genuine terror.
Martial-arts megastar Jackie Chan wrote, directed and stars in this action-comedy. Secret agent Jackie (Chan) leads a commando group to Africa to kidnap scientists who are working to unleash a powerful -- and lethal -- new energy source. When Jackie develops amnesia after a plane crash, he fights to regain his memory and continue his assignment. Who Am I is packed with excitement and, of course, Jackie's unique brand of gymnastic martial arts.
Dan Mahowny was a rising star at the Canadian Imperial Bank of Commerce. At twenty-four he was assistant manager of a major branch in the heart of Toronto's financial district. To his colleagues he was a workaholic. To his customers, he was astute, decisive and helpful. To his friends, he was a quiet, but humorous man who enjoyed watching sports on television. To his girlfriend, he was shy but engaging. None of them knew the other side of Dan Mahowny--the side that executed the largest single-handed bank fraud in Canadian history, grossing over $10 million in eighteen months to feed his gambling obsession.
A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into Jack's personal life, everything Jack holds dear is suddenly at stake.
Fida tells the story of Jai who one day happen to meet a young and beautiful woman called Neha and he falls in love with her at first sight.
Please enter your e-mail address to subscribe for updates
The General Data Protection Regulation (GDPR) and Cookies
On 25 May 2018, the General Data Protection Regulation (GDPR) (EU) 2016/679 will come into force. The GDPR strengthens and clarifies the rights of EU-resident natural persons with regard to their personal information The Terms and Conditions and the Privacy Policy for Valossa services have been updated accordingly.
Please review Valossa's updated Terms and Conditions, Privacy Policy and the Cookie Policy. If you use our services to process personal information of EU-resident natural persons you need to comply with the GDPR. By using our services on or after 25 May 2018, you will be agreeing to the changes.
Under the GDPR, you have several rights, such as accessing your own personal data, erasing of that data, and the right to be notified within 72 hours of a data breach that is likely to result in a risk for your rights and freedoms. You may reach the Data Protection Officer (DPO) of Valossa when needed, and the details for doing so can be found in the updated Privacy Policy.
Click 'OK' to agree and continue using WhatIsMyMovie.com.