Chronicles the life of Widow, a female kingpin in the global underground of Ransomware-as-a-Service crime syndicates. It follows her group's rise to power to establish itself as the new polar power in the global Ransomware economy.
Casts Aaron Murray, Amy Zeal, Chloe Colleen, Felix Merback, Gino Basilotta, Rockshana Desances, Melissa Knight, Paul Cervenka
MOVIE COMMENTS
SIMILAR MOVIES
Tron
Heat
Superman III
Catastrophe, Inc.
Expelled from Paradise
Cabin Pressure
Nerve
Jason Bourne
Gospel of Ted
Offline: Are You Ready for the Next Level?
PENCOERIAN BALIK!
Privacy Breach
Delta Star: Temporal Agent from the Future vs. Cavemanoid
Antitrust
Stay Alive
Lawnmower Man 2: Beyond Cyberspace
Mr. Robot_dec0d3d.doc
Dot.Kill
The Girl Who Played with Fire
Putin's Bears - The Most Dangerous Hackers in the World
SIMILAR MOVIES
Tron
IMDB 6.6 | Jul , 1982
When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.Heat
IMDB 0 | Jul , 2022
A Chief Financial Officer for a large bank is hacked and has the secret pass-phrases to his personal cryptocurrency wallet compromised that holds $25 Million of his own money in it, which he needs for his daughter's heart transplant surgery. With intent on going after the bigger prize -- the bank he works for -- the hackers offer his personal money back in exchange for the password to the account containing $1 Billion of the bank's money.Superman III
IMDB 5.5 | Jun , 1983
Aiming to defeat the Man of Steel, wealthy executive Ross Webster hires bumbling but brilliant Gus Gorman to develop synthetic kryptonite, which yields some unexpected psychological effects. Between rekindling romance with his high school sweetheart and saving himself, Superman must contend with a powerful supercomputer.Catastrophe, Inc.
IMDB 0 | Jul , 2022
A bank is hacked and the Security Operations Center manager goes back in time to change a critical decision he made that could change the course of a future breach that has taken down the entire bank.Expelled from Paradise
IMDB 6.4 | Nov , 2014
A.D. 2400, DEVA's central council detects an incident of unauthorized access into their mainframe. Someone on Earth was trying to hack into the system. The only information DEVA was able to retrieve was that hacker referred to themselves as "Frontier Setter." To investigate the mysterious hacker's motives, the high officials of DEVA dispatch system Security Third Officer Angela Balzac to the Earth's surface. Equipped with a prosthetic "material body," Angela attempts to make contact with a local agent Dingo, but what awaited her instead was a swarm of Sandworms now infesting the Earth's surface. Angela intercepts the gruesome pests with her exoskeleton powered suit Arhan.Cabin Pressure
IMDB 5.1 | Aug , 2001
A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.Nerve
IMDB 7 | Jun , 2016
Industrious high school senior Vee Delmonico has had it with living life on the sidelines. When pressured by friends to join the popular online game Nerve, Vee decides to sign up for just one dare in what seems like harmless fun. But as she finds herself caught up in the thrill of the adrenaline-fueled competition partnered with a mysterious stranger, the game begins to take a sinister turn with increasingly dangerous acts, leading her into a high stakes finale that will determine her entire future.Jason Bourne
IMDB 6.4 | Jul , 2016
The most dangerous former operative of the CIA is drawn out of hiding to uncover hidden truths about his past.Gospel of Ted
IMDB 0 | Aug , 2022
Ferrari Thunderbird Taylor is getting ready to leave South Carolina behind forever and start a new life in the Queen City - until her deadbeat husband exchanges all their hard-earned money for cryptocurrency at the behest of a shadowy cult figure, known only as Ted. Before her new life can begin, Ferra must dismantle Ted's legion of Apocalypse-preppers, restore her husband's sanity, and salvage what's left of her good name.Offline: Are You Ready for the Next Level?
IMDB 5.5 | Jan , 2016
Champion gamer Jan has to fight for his digital identity, winning back his real life as well.PENCOERIAN BALIK!
IMDB 0 | Apr , 2024
Privacy Breach
IMDB 10 | Oct , 2020
After witnessing the violent arrest of Ted Carter (Ethan N), Kit Porter (Henri L), a tech savvy baseball fan, uncovers a secret government conspiracy to watch over every citizen. After teaming up with Max Stone (Josh M) and Doug Reese (Charlie R), the crew try to take down the surveillance systems and restore privacy to the world. Nominated for multiple yo mama awards. Privacy Breach stands as a potent warning against surveillance, and begs an important question. How far will we go for law and order? After an emotional clip from the film went viral in 2020, directors everywhere looked towards this film for inspiration. Cited as "Your favourite film-makers favourite film", Privacy Breach tries, and succeeds, to tell a unique story that will remain unrivaled in the coming decades. 2020 is the new 1984. Privacy Breach. This aint yo daddys dystopian horrorDelta Star: Temporal Agent from the Future vs. Cavemanoid
IMDB 0 | Dec , 2024
Temporal agent Delta Star, a legendary hero from the future, arrives in our time to fight Cavemanoid, who came from the past and is capable of destroying the entire galaxy. However, defeating such a powerful enemy will not be easy...Antitrust
IMDB 6 | Jan , 2001
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.Stay Alive
IMDB 5.8 | Mar , 2006
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!Lawnmower Man 2: Beyond Cyberspace
IMDB 3.3 | Jan , 1996
After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.Mr. Robot_dec0d3d.doc
IMDB 0 | Jun , 2016
In Mr. Robot Decoded, creator Sam Esmail, stars Rami Malek and Christian Slater, real-life hacker Jeff Moss and other experts open up about how the show made an extremely technical subject relatable to a wide audience and brought humanity to hackers through the main character Elliot Alderson.Dot.Kill
IMDB 4.2 | Mar , 2005
Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.The Girl Who Played with Fire
IMDB 7 | Sep , 2009
Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.Putin's Bears - The Most Dangerous Hackers in the World
IMDB 7.2 | Feb , 2024
They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?