It has been ten years since The Battle of the Breach and the oceans are still, but restless. Vindicated by the victory at the Breach, the Jaeger program has evolved into the most powerful global defense force in human history. The PPDC now calls upon the best and brightest to rise up and become the next generation of heroes when the Kaiju threat returns.
John McClane is back and badder than ever, and this time he calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
Retirement at last! Middle-aged and divorced, company owner Richard Jones is looking forward to a worry-free existence as he arrives at his office on his last day of work. Much to his dismay, he discovers that the management buyout of his company was fraudulent. The company is now bankrupt and the employee pension fund — including his own — has been embezzled. Enlisting the help of his ex-wife Kate, Richard sets out to track down the shady businessman behind the fraud.
Guy Manley, formerly the world’s most preeminent secret agent, who, while drowning in his alcohol-filled retirement, is brought back for one last mission by his former boss Buck Cash. His mission? Kill Buck's brother, Rich Cash, keeping him from being elected the city's new mayor, thereby stopping him from becoming the most powerful person in the world!
A war vet with severe PTSD is threatened by a online video gamer crew for being too good at beating them. He finds out about a personal connection to him that makes him snap.
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
This documentary reveals how a group of hackers powered the darkest corners of the internet from a Cold War-era bunker in a quiet German tourist town.
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.
This program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Through interviews with frontline personnel from the Department of Defense, NYPD’s computer crime squad, private detective firm Kroll Associates, X-Force Threat Analysis Service, and several notorious crackers, the program provides penetrating insights into the millions of hack attacks that occur annually in the U.S.—including one that affected the phone bills of millions and another that left confidential details of the B-1 stealth bomber in the hands of teenagers. The liabilities of wireless networks, the Code Red worm, and online movie piracy are also discussed. A Discovery Channel Production. (51 minutes)
Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.
Sigurdur Thordarson, known as Siggi, becomes a hacker at 12, exposing Icelandic bank corruption at 14. Branded the "teenage whistleblower," he joins WikiLeaks in 2010, mentored by Julian Assange. Siggi leaks globally, but clashes with Assange, prompting him to spy for the FBI at 18. This tale weaves paranoia, hacking, and friendship, portraying Siggi's turbulent journey from trust to betrayal, revealing a heart-wrenching coming-of-age narrative.
Two FBI agents pursue members of a radical hacker collective after they steal a powerful cyber-weapon.
Using the moniker 'Solo', Gary McKinnon broke into 97 US military and NASA computers from London over the course of 13 months, causing outages and deleting files. He also posted a criticism of the military's security on their website.
A vice detective must decide how far he will go in order to protect his informant.