eXistenZ
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
eXistenZ
1999
6
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
eXistenZ
1999
6
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
Nirvana
1997
6
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
Absolut
2005
7
On their cross-country drive, a married couple, Jeff and Amy Taylor, experience car trouble after their SUV breaks down. Stranded in the New Mexico desert, the two catch a break when a passing truck driver offers Amy a ride to a nearby café to call for help. Meanwhile, Jeff is able to fix the car and make his way to the café, but Amy isn't there. He tracks down the trucker -- who tells the police he's never seen Jeff or his wife before. Jeff then begins a desperate, frenzied search for Amy.
Breakdown
1997
6
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
Firewall
2006
5
A young man receives an emergency phone call on his cell phone from an older woman. She claims to have been kidnapped – and the kidnappers have targeted her husband and child next.
Cellular
2004
6
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
The Net 2.0
2006
5
An edgy action thriller set in Las Vegas during a terrorist attack. A genius computer loner takes control of the city and the attack as he fights with his fits of overwhelming depression and obsessions with love and death.
Double Down
2005
4
A crew of officers at an armored transport security firm risk their lives when they embark on the ultimate heist against their own company. Armed with a seemingly fool-proof plan, the men plan on making off with a fortune with harm to none. But when an unexpected witness interferes, the plan quickly unravels and all bets are off.
Armored
2009
5
While doing a friend a favour and searching for a runaway teenager, a police detective stumbles upon a bizarre band of criminals about to pull off a bank robbery. The screenplay by Christopher Cannan and Steve Barancik is based on the short story "The House in Turk Street" by Dashiell Hammett.
No Good Deed
2002
5
A hacker discovers a Zoom file on a local Police server and leaks it to the public. The contents of the file have been kept under wraps to avoid further public outcry and protests. What may seem to be your typical weekly office Zoom call turns into a missing employee and a "who done it" mystery.
Zoom.Mov
2020
5
Based on the true story of would-be Brooklyn bank robbers John Wojtowicz and Salvatore Naturile. Sonny and Sal attempt a bank heist which quickly turns sour and escalates into a hostage situation and stand-off with the police. As Sonny's motives for the robbery are slowly revealed and things become more complicated, the heist turns into a media circus.
Dog Day Afternoon
1975
7
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
23
1998
6
Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
Who Am I - Kein System ist sicher
2014
7
A bank accountant who moonlights as a high-priced call girl becomes embroiled in the lives of a money launderer, his seductive wife, and his bodyguard.
Wild Side
1996
5
Womanizing thug Klett is sprung from the courthouse by two accomplices, then sets about planning the big heist of a local bank, equipped with a cache of high-powered weapons he's acquired from an American army outpost. Together with his faithful protégé, who reluctantly on-boards his young girlfriend and her AWOL brother, the quartet bumble their way through the supposedly full-proof plan that aims to deliver them a cool million in cash and a new life in Australia. Predictably, things deteriorate quickly at every turn.
Blutiger Freitag
1972
5
Genius hacker Connor discovers Cicada 3301, an online treasure hunt that could be a recruiting tool for a secret society. Soon Conner, art-expert friend Avi, and secretive librarian Gwen are dashing from graffiti sites to ancient libraries to uncover real-world clues. But they must outrun aggressive NSA agents, also hot on the trail of Cicada, who want the glory for themselves.
Dark Web: Cicada 3301
2021
5
A beautiful computer programmer is framed by her fraudulent lover and sent to prison. When she gets out she agrees to cooperate with a scheme of a fellow-inmate to defraud a bank, in order to have enough money to escape from her (by then) ex-lover.
Access Denied
1996
1
In real life, Kwon Yoo is unemployed, but in the virtual game world he is the best leader. Kwon Yoo is then framed for a murder. With the help of hacker Yeo-Wool, he tries to uncover the truth behind the murder case.
조작된 도시
2017
7
A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
夕陽天使
2002
6