All Hacking and Cyber Security Movies in One List (2011 – 2021) Ankit Chaubey, 18, August 202218, August 2022 TABLE OF CONTENTS0.1 The list –0.2 Mission Impossible: Ghost Protocol – 20110.3 StuxNet: Cyberwar -20110.4 Code 2600 – 20120.5 Genius on Hold – 20120.6 Owned & Operated – 20120.7 Panopticon – 20120.8 Reboot – 20120.9 Shadows of Liberty – 20120.10 Skyfall – 20120.11 Tracked Down – 20120.12 Underground: The Julian Assange Story – 20120.13 We Are Legion: The Story of the Hacktivists – 20120.14 The Assange Agenda: Surveillance, Democracy and You – 20130.15 Big Data: The Shell Investigation – 20130.16 The Bling Ring – 20130.17 DEFCON: The Documentary – 20130.18 Disconnect – 20130.19 DSKNECTD – 20130.20 The Fear That Has 1000 Eyes – 20130.21 The Fifth Estate – 20130.22 Goodbye World – 20130.23 Google and the World Brain – 20130.24 Her – 20130.25 Identity Thief – 20130.26 In Google We Trust – 20130.27 Mickey Virus – 20130.28 Terms and Conditions May Apply – 20130.29 TPB AFK: The Pirate Bay Away from Keyboard – 20130.30 The Value of Your Personal Data – 20130.31 War on Whistleblowers: Free Press and the National Security State – 20130.32 Algorithm – 20140.33 The Bureau of Digital Sabotage – 20140.34 Citizenfour – 20140.35 Digital Amnesia – 20140.36 Ex Machina – 20140.37 The Hackers Wars – 20140.38 The Human Face of Big Data – 20140.39 The Imitation Game – 20140.40 Inside The Dark Web – 20140.41 The Internet’s Own Boy: The Story of Aaron Swartz – 20140.42 Killswitch – 20140.43 Men, Women and Children – 20140.44 Open Windows – 20140.45 The Signal – 20140.46 Transcendence – 20140.47 Unfriended – 20140.48 Who Am I – 20140.49 Big Data: Unlocking Success – 20150.50 Blackhat – 20150.51 Cyberbully – 20150.52 Cybertopia: Dreams of Silicon Valley – 20150.53 Debug – 20150.54 Deep Web – 20150.55 Democracy: Im Rausch der Daten – 20150.56 Digitale Dissidenten – 20150.57 Furious 7 – 20150.58 A Good American – 20150.59 Hacker’s Game – 20150.60 Jobs vs. Gates: The Hippie and The Nerd – 20150.61 Mapping the Future – 20150.62 Terminal F/Chasing Edward Snowden – 20150.63 The Throwaways – 20150.64 War for the Web – 20150.65 Anonymous – 20160.66 Backlight: Cyberjihad – 20160.67 Cyber War – 20160.68 Data Center: The True Cost of the Internet – 20160.69 Down the Deep, Dark Web – 20160.70 Gringo: The Dangerous Life of John McAfee – 20160.71 The Haystack – 20160.72 I.T. – 20160.73 Jason Bourne – 20160.74 Lo and Behold: Reveries of the Connected World – 20160.75 National Bird – 20160.76 Nerve – 20160.77 Offline is the New Luxury – 20160.78 Rise of the Trolls – 20160.79 Risk – 20160.80 Silicon Cowboys – 20160.81 Snowden – 20160.82 State of Surveillance – 20160.83 Stingray – 20160.84 What Makes You Click – 20160.85 Zero Days – 20160.86 AlphaGo – 20170.87 The Circle – 20170.88 The Crash – 20170.89 Facebook: Cracking the Code – 20170.90 The Fate of the Furious – 20170.91 Ghost in the Shell – 20170.92 Kim Dotcom: Caught in the Web – 20170.93 Meeting Snowden – 20170.94 Nothing to Hide – 20170.95 Silk Road: Drugs, Death, and the Dark Web – 20170.96 Stare Into The Lights My Pretties – 20170.97 Thoughtcrime – 20170.98 Weapons of Mass Surveillance – 20170.99 Anon – 20180.100 Assassination Nation – 20180.101 Black Code – 20180.102 Cam – 20180.103 The Cleaners – 20180.104 The Creepy Line – 20180.105 The Defenders – 20180.106 Digital Addicts – 20180.107 Do You Trust This Computer? – 20180.108 Edward Snowden: Whistleblower or Spy? – 20180.109 The Feeling of Being Watched – 20180.110 General Magic – 20180.111 The Girl in the Spider’s Web – 20180.112 Hacked – 20180.113 Inside Facebook: Secrets of a Social Network – 20180.114 Inside the Russian Info War Machine – 20180.115 Irumbu Thirai – 20180.116 Johnny English Strikes Again – 20180.117 King of Crime – 20180.118 Ocean’s 8 – 20180.119 Peripheral – 20180.120 Searching – 20180.121 Unfriended: Dark Web – 20180.122 BD2K: Big Data to Knowledge – 20190.123 Cyber Crime – 20190.124 Dataland – 20190.125 The Great Hack – 20190.126 HAK_MTL – 20190.127 Hero or Villain? The Prosecution of Julian Assange – 20190.128 Kee – 20190.129 Machine Learning: Living in the Age of AI – 20190.130 Official Secrets – 20190.131 Password – 20190.132 The Secrets of Silicon Valley – 20190.133 Third Eye Spies – 20190.134 Unfriends – 20190.135 WannaCry: The Marcus Hutchins Story – 20190.136 Who You Think I Am – 20190.137 You Can’t Watch This – 20190.138 Mr. Robot – (2015 – 2019)0.139 Archive – 20200.140 The Big Reset 2.0 – 20200.141 Childhood 2.0 – 20200.142 Cyberlante – 20200.143 Enemies of the State – 20200.144 Interference: Democracy at Risk – 20200.145 The Internet of Everything – 20200.146 Julian Assange: Revolution Now – 20200.147 Kill Chain: The Cyber War on America’s Elections – 20200.148 KnowBe4: The Making Of A Unicorn – 20200.149 No Safe Spaces – 20200.150 Out Of Dark – 20200.151 Password – 20200.152 Screen Generation – 20200.153 The Social Dilemma – 20200.154 Tenet – 20200.155 We Need to Talk About A.I. – 20200.156 Chakra – 20210.157 Cryptopia: Bitcoin, Blockchains, And The Future Of The Internet – 20210.158 Dark Web: Cicada 3301 – 20210.159 Dark Web: Fighting Cybercrime – 20210.160 Dear Hacker – 20210.161 MY.DOOM: Earth’s Deadliest [Computer] Virus – 20210.162 Hacker Fairies – 20210.163 Hacker: Trust No One – 20210.164 Love Hard – 20210.165 The Perfect Weapon – 20210.166 Silk Road – 20210.167 The Mitchells vs The Machines – 20210.168 The Spy in Your Phone – 20210.169 Twenty Hacker – 20210.170 WANNACRY: Earth’s Deadliest [Computer] Virus – 20211 Related:1.1 About The Author1.1.1 Ankit Chaubey1.2 RelatedThe list –Mission Impossible: Ghost Protocol – 2011When the IMF is wrongly accused of bombing the Kremlin, Ethan and his team race against time to find the real culprits and clear the reputation of their organisation.StuxNet: Cyberwar -2011In July 2010 a computer virus attacked a nuclear facility in Iran. This virus, known as the most intelligent piece of software to date, is the beginning of a new era in cyber crimes.Code 2600 – 2012The rise of the information technology age is told through interviews with the people who helped build and manipulate it.Genius on Hold – 2012Shaw, a ruthless jewel thief, is a metaphor and a symbol for its time – for the twentieth century and for today. The story of Walter L. Shaw, a telecommunications genius, and his son Walter T. Shaw, a ruthless jewel thief, is a metaphor and a symbol for its time – for the twentieth century and for today.Owned & Operated – 2012Owned & Operated is a mosaic of the world through the lens of the Internet. Showing our lives as consumers, under the thumbs of privileged individuals and their methods of control. But the w… Read all. Showing our lives as consumers, under the thumbs of privileged individuals and their methods of control.Panopticon – 2012Control on our daily lives increases and privacy is disappearing. How is this exactly happening and in which way will it effect all our lives? Control on our daily lives increases and privacy is disappearing.Reboot – 2012A young female hacker awakens from a traumatic event that she scarcely remembers, and an iPhone glued to her hand. On the phone, a countdown is ticking away to zero. What happens at zero? Who is she, and why has she become an extension of the device?Shadows of Liberty – 2012Examines the new media monopoly by corporations in America versus the public battle for truth and democracy.Skyfall – 2012An ex-MI6 agent steals a hard drive with top-secret information to carry out a vendetta on Bond’s overseer, M. Bond must face his past in a bid to try and save M.Tracked Down – 2012Directed by Paul Moreira, this documentary explains how governments around the world monitor their citizens through advanced electronic warfare equipment — equipment that has fallen into the hands of repressive dictatorial regimes in Libya, Syria and Bahrain. Moreira reveals how the technology can be traded in stealth and traces these deals to their source.Underground: The Julian Assange Story – 2012Take a look at the various significant events that have occurred in the life and career of Julian Assange, founder and director of Wikileaks.We Are Legion: The Story of the Hacktivists – 2012A detailed look at the beginnings of hacktivist group `Anonymous’, and how they are trying to change the world with their own brand of chaos.The Assange Agenda: Surveillance, Democracy and You – 2013At what point does government surveillance put democracy at risk? According to Julian Assange — founder of Wikileaks — we’re already there. This documentary explores what may lay ahead for today’s digital world if we don’t gain control over the various agencies spying on us. Big Data: The Shell Investigation – 2013Oceans of information are floating in the digital hemisphere. If you know what you’re looking for and how to find it, nothing is out of reach. This is a disturbing reality for many law-abiding citizens who cherish their privacy, but it can also be an essential tool for professional pursuits like journalism. The VPRO documentary series puts this potential to the test in Big Data: The Shell Investigation, an absorbing look into the oil giant’s two billion dollar debt to the Iranian government.The Bling Ring – 2013A group of high-school students begins breaking into the homes of major celebrities to rob them of millions of dollars in clothes, shoes and jewellery. DEFCON: The Documentary – 2013DEFCON is the world’s largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEFCON 20, a documentary crew was allowed full access to the event. The film follows the four days of the conference, the events and people (attendees and staff), and covers history and philosophy behind DEFCON’s success and unique experience.Disconnect – 2013Three intersecting stories center around the impact of the Internet on people’s lives. The characters include a victim of cyberbullying, a lawyer who communicates constantly through his cell phone but can’t find time to connect with his family, and a couple whose secrets are exposed online.DSKNECTD – 2013Filmmaker Dominic H White examines how digital communication technology, such as smart phones and social media, affects the way humans interact. The Fear That Has 1000 Eyes – 2013This documentary looks at various terrorist attacks – New York, London, Madrid, and Oslo – and discusses how they have changed urban life, including increased electronic surveillance. It also explores the balance between the need for security and freedom.The Fifth Estate – 2013WikiLeaks’s founding duo work as watchdogs and leak secret data to the world. However, they find themselves in a fix when they obtain access to confidential documents related to the US Intelligence.Goodbye World – 2013Friends and strangers find shelter in a remote cabin after the collapse of the power grid leads to mass panic.Google and the World Brain – 2013Google and the World Brain is a 2013 documentary movie about the Google Books Library Project directed by Ben Lewis, produced by BBC, Polar Star Films and Arte. The main focus in the plot is on copyright controversy caused by the project that resulted in Google Book Search Settlement Agreement. WikipediaHer – 2013Theodore Twombly, an introverted writer, buys an Artificial Intelligence system to help him write. However, when he finds out about the AI’s ability to learn and adapt, he falls in love with it.Identity Thief – 2013Sandy is shocked to learn that someone has stolen his identity and has been living it up in Florida. When he leaves his home and job to find the culprit, he also has to deal with bounty hunters.In Google We Trust – 2013A look at how governments and companies log digital interactions and data on the daily lives of their users. Geoff takes a look at the consequences.Mickey Virus – 2013Mickey, a small-time hacker, helps Kamayani, the woman he loves, reverse a web transaction by hacking her company’s website. However, he mistakenly ends up committing a robbery worth INR 100 crore. Terms and Conditions May Apply – 2013Cullen Hoback investigates the ins and outs of agreeing to terms and conditions and privacy policies. Including interviews with Moby, Mark Zuckerberg and Google Engineer Ray Kurzweil.TPB AFK: The Pirate Bay Away from Keyboard – 2013A look at the lives of Gottfrid Svartholm, Fredrik Neij and Peter Sunde the three founders of torrent website The Pirate Bay. The Value of Your Personal Data – 2013Produced by the acclaimed VPRO documentary series, The Value of Your Personal Data exposes their secretive practices, and offers tips on how you can gain the upper hand. War on Whistleblowers: Free Press and the National Security State – 2013Filmmaker Robert Greenwald highlights four instances of government whistle-blowing as exposed by the media.Algorithm – 2014A freelance computer hacker discovers a mysterious government computer program. He breaks into the program and is thrust into a revolution. The Bureau of Digital Sabotage – 2014We seem to be prisoners of a worldwide digital web, created by governments and Silicon Valley. How do we stay in control of our own data? Are there ways to escape the digital dystopia? More…Citizenfour – 2014After Laura Poitras received encrypted emails from someone with information on the government’s massive covert-surveillance programs, she and reporter Glenn Greenwald flew to Hong Kong to meet the sender, who turned out to be Edward Snowden.Digital Amnesia – 2014Digital Amnesia (2014) This 50 minute VPRO back light documentary radically discusses an unknown issue to the public related to global data and information slippage due to the technological obsolescence and will cover many sustainable solutions from many experts in the field of digital data recovery.Ex Machina – 2014Caleb Smith, a young programmer, gets a chance to become a part of a strange scientific experiment where he is expected to assess artificial intelligence by interacting with a female robot.The Hackers Wars – 2014A look at the high-stakes battle over the fate of the Internet, freedom and privacy. Featuring the tales of the anarchic troll provocateur Andrew “weev” Aurenheimer, prodigy hacker hero Jeremy Hammond, and incendiary watchdog journalist Barrett Brown.The Human Face of Big Data – 2014With the rapid emergence of digital devices, an unstoppable, invisible force is changing human lives in ways from the microscopic to the gargantuan: Big Data, a word that was barelyThe Imitation Game – 2014Alan Turing, a British mathematician, joins the cryptography team to decipher the German enigma code. With the help of his fellow mathematicians, he builds a machine to crack the codes.Inside The Dark Web – 2014Series exploring topical scientific issues. With many concerned about internet surveillance, Horizon meets the hackers and scientists whose technology is fighting back.The Internet’s Own Boy: The Story of Aaron Swartz – 2014Filmmaker Brian Knappenberger explores the life and work of programming prodigy and information activist Aaron Swartz.Killswitch – 2014Exploring the contemporary state of the internet, exploring its relationship with free speech, innovation and democracy.Men, Women and Children – 2014The excessive use of the internet affects a group of teenagers and their parents as they try dealing with their relationships and self-image issues.Open Windows – 2014Nick is upset when his favourite actress cancels their date but her manager offers him a deal to spy on her instead. However, he soon realises that he is being used as bait to threaten Jill’s safety.The Signal – 2014Nic, Jonah and Haley are on a road-trip to California when a hacker begins taunting them with emails. While trying to track the hacker’s location, they end up in an underground research facility.Transcendence – 2014Will’s desperate wife uploads his consciousness into a quantum computer to save him. He soon begins making groundbreaking discoveries but also displays signs of a dark and hidden motive.Unfriended – 2014Six friends get the shock of their lives when they receive a message from their deceased friend while video chatting. While they think it is a prank, they are soon exposed to some unruly events.Who Am I – 2014Benjamin, a computer genius, is invited to join FRI3NDS, a fame-seeking hacker group. However, when his associates are murdered by Russian gangsters, he is interrogated by Europol.Big Data: Unlocking Success – 2015A conceptual documentary about technological innovations in the use of data science and its allied fields. Featuring stories of: MGM Resorts International; Johns Hopkins University (Star Mapping of the Sloan Digital Imaging Project); Toyota Financial Services; Lytx; DOE Joint Gen… Read allBlackhat – 2015Nick, a hacker, is released from jail when a code created by him is linked to a terrorist attack. While trying to help the police, he gets dragged into the conflicts between America and China.Cyberbully – 2015A chilling real-time thriller about a teenager who experiences the worst that the web has to offer when she’s targeted by an anonymous cyber-stalker.Cybertopia: Dreams of Silicon Valley – 2015Silicon Valley, California. This is where the planet’s most forward-thinking dream merchants converge to imagine and create a new digitized reality that can transcend politics, war and other ills that plague the growth and stability of our society. Cybertopia: Dreams of Silicon Valley takes us to the epicenter of this technological revolution, and introduces us to the figures who hope to reshape a brave new world through the force of their vision.Debug – 2015Six young computer programmers on work release are tasked to debug the artificial intelligence of an interstellar spaceship. The sentient and psychotic AI of the ship tries to kill them all.Deep Web – 2015A riveting look into the murky reaches of cyberspace sheds light on the arrest and trial of the alleged creator of Silk Road, an online black market.Democracy: Im Rausch der Daten – 2015The creation of the Data Protection Directive of the European Union.Digitale Dissidenten – 2015Exploring the activists and whistleblowers of the digital age who are fighting for privacy and transparency in the technological world.Furious 7 – 2015Dominic and his family are caught in a quagmire when Shaw’s brother seeks bloody revenge. They must not only deal with their enemy but also save a crucial programme from falling into the wrong hands.A Good American – 2015Bill Binney, the former technical director of the NSA, discusses the agency’s decision not to use a cheap surveillance tool that would have predicted the attacks on September 11, 2001.Hacker’s Game – 2015This modern and relevant thriller finds Soyan, a computer prodigy and Loise, a cyber detective embark on an intense but dangerous romance as the fate of an arms dealer falls in their laps.Jobs vs. Gates: The Hippie and The Nerd – 2015Since the late 1970s, Bill Gates and Steve Jobs had a rivalry that almost embodies the entire digital revolution in the eighties, nineties and noughties.Mapping the Future – 2015In the last few years, the data stream flowing through the internet has turned into a tsunami: Ninety percent of the information sitting on the world’s servers was created in the last two years. This total digitization opens up completely new possibilities. Suddenly, our entire l… Read allTerminal F/Chasing Edward Snowden – 2015A look at Edward Snowden’s escape from American authorities. The NSA analyst-turned whitstle blower headed to Hong Kong and later to Russia.The Throwaways – 2015Drew, a hacker, is captured by the CIA and given a choice to help capture a terrorist instead of jail time. He forms a team with three bottom tier agents and sets out to capture the terrorist.War for the Web – 2015War for the Web demystifies the physical infrastructure of the Internet and uses that as a basis to explore the issues of ownership and competition in the broadband marketplace, privacy, and security.Anonymous – 2016When Alex’s family faces a financial problem, he turns to illegal online trading to make quick money. Deep in the virtual world, FBI’s most-wanted hacker is hiding and he tries to approach Alex.Backlight: Cyberjihad – 2016Tegenlicht zooms in on the virtual weapons that the IS uses to recruit young Europeans, with a focus on why so many European young people are falling for the ‘medieval reality show’ of IS.Cyber War – 2016As technology becomes more important to people’s everyday lives, the threat of cyberwarfare grows, with hacking being among the most frequent forms of the crime. Vice security reporter Ben Makuch investigates the topic as he travels across the world. Along the way, he talks to hackers, government officials and dissidents to get an idea of what goes on in the world of cyberwarfare. In addition to hacking, the series takes a look at issues such as spying and other online crimes.Data Center: The True Cost of the Internet – 2016Every day, 247 billion emails are sent through the web. Have you ever wondered what powers them? This eye-opening, high-tech documentary takes viewers inside the digital warehouses that run the internet, otherwise known as data centers.Down the Deep, Dark Web – 2016The darknet reverses everything you thought you knew about the internet and the dangers of the digital world. Assembly of hackers, crypto-anarchists, and libertarians – stand on the frontier of an unseen battle for privacy, shielded by the anonymity of the Darknet.Gringo: The Dangerous Life of John McAfee – 2016Filmmaker Nanette Burstein tries to unravel the strange behaviour of John McAfee, who left his life as a software mogul to become a recluse in the jungles of Belize.The Haystack – 2016The modern era of sophisticated hacking techniques, and the increasingly dangerous terrorist organizations that often employ them, demand a new approach from law enforcement. That’s why the British Parliament is currently reviewing the Investigatory Powers Bill, a crucial piece of legislation that would provide more leniency in the interception of private email and phone communications. The Haystack examines whether this bill would prove effective or necessary, and what everyday citizens would have to give up if it’s ultimately implemented. I.T. – 2016Mike Regan is a self-made man who has it all: a gorgeous wife, a beautiful teenage daughter, and a sleek, state-of-the-art smart home. But he soon finds himself in a deadly, high-stakes game of cat-and-mouse when his I.T. consultant, Ed, starts using his skills to stalk Mike’s daughter and endanger his family, his business, and his life. In a world where there is no privacy, Mike needs to rely on his old connections to defeat a new kind of nemesis.Jason Bourne – 2016Jason Bourne, a former CIA agent, is drawn out of hiding by CIA director Robert Dewey. He then sets out to discover more about his past, family and his father’s death.Lo and Behold: Reveries of the Connected World – 2016Filmmaker Werner Herzog examines the ways in which the Internet has impacted human interaction, and the ways it will continue to impact contemporary society.National Bird – 2016A chilling documentary in which three military veterans blow the whistle on the secret U.S. drone war, highlighting America’s modern warfare program through the harrowing experiences of those involved. Nerve – 2016A naive high school girl participates in an online game of truth or dare called Nerve. However, she soon finds herself being coerced into performing life-threatening tasks.Offline is the New Luxury – 2016We’ve all witnessed it in restaurants, family gatherings or special events. Resembling hordes of mesmerized zombies, nearly every face we see is buried in the hypnotic glow of their smart phone or tablet. Is there any escape? The new documentary titled Offline is the New Luxury, produced by VPRO, follows a new movement geared towards of achieving just that.Rise of the Trolls – 2016The growth of the internet has brought an entirely new form of provocation to the forefront, leading internet trolls to send messages with abusive content to targeted users.Risk – 2016Filmed over six years, Laura Poitras gains unprecedented access to WikiLeaks founder Julian Assange, and finds herself caught between the motives and contradictions of Assange and his inner circle.Silicon Cowboys – 2016Launched in 1982 by three friends in a Houston diner, Compaq Computer set out to build a portable PC to take on IBM, the world’s most powerful tech company. Many had tried cloning the industry leader’s code, only to be trounced by IBM and its high-priced lawyers. “Silicon Cowboys” traces the rise, and eventual demise, of the unlikely upstart that would alter the future of computing and shape the world as it is known today.Snowden – 2016After discovering that the NSA is illegally spying on ordinary US citizens, Edward Snowden, an employee of the agency, grapples with the decision to leak their classified documents to the press.State of Surveillance – 2016In Moscow, VICE co-founder Shane Smith’s in depth interview with controversial NSA whistle blower Edward Snowden serves as the backdrop for a story on the state of government sponsored surveillance both at home in the US and around the world.Stingray – 2016This documentary enlightens viewers to just how advanced surveillance technology has become, highlighting the Stingray, which, despite going by many different names, has certified itself as one of the most powerful surveillance devices of all time, though many see it as an invasion of privacy. What Makes You Click – 2016A documentary on companies adapting their websites and apps in order to get consumers staying on them longer and spending more money. A documentary on companies adapting their websites and apps in order to get consumers staying on them longer and spending more money.Zero Days – 2016The malware worm Stuxnet, famously used against Iranian centrifuges, has been claimed by many to have originated as a joint effort between America and Israel.AlphaGo – 2017A journey from the halls of Cambridge to Seoul, where a legendary Go master faces an unproven AI challenger.The Circle – 2017Mae is ecstatic to be employed in the biggest tech company in the world. But after she gets involved in an experiment that could change the world, she realises its adverse consequences.The Crash – 2017The government enlists a team of white-collar criminals to thwart a cyberattack that threatens to bankrupt the United States.Facebook: Cracking the Code – 2017What does Facebook know about you? This documentary digs deep into the security issues that social media giant Facebook doesn’t want you to know, including how they track browsing data, promote targeted ads, and spread false information. The Fate of the Furious – 2017Dom encounters a mysterious woman, Cipher, who gets him involved in the world of terrorism. The crew has to reunite to stop Cipher and save the man who brought them together as a family.Ghost in the Shell – 2017In the near future, Mira, the first cyber-human, must stop the growing cyber-terrorism. After discovering a secret of her identity, she sets out to learn more about her obscured past.Kim Dotcom: Caught in the Web – 2017Tech entrepreneur, and owner of file-sharing site, MegaUpload, Kim Dotcom arrived in New Zealand with his family in late 2010. Seeking peace and quiet, Dotcom rented a large mansion and settled down into an extravagant, luxurious life.Meeting Snowden – 2017Edward Snowden, Lawrence Lassig and Birgitta Jónsdóttir wonder about the future of democracy.Nothing to Hide – 2017An independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.NOTHING TO HIDE questions the growing, puzzling and passive public acceptance of massive corporate and governmental incursions into individual and group privacy and rights. People generally agree that mass surveillance regimes are inherently invasive and authoritarian. Yet at the same time, the number of online apps and “free” services people install is constantly increasing. Forced to accept their terms and conditions, they click away their privacy and grant access to their own personal data. To justify their compliance, most of the people usually repeat: “Anyway, I don’t interest anyone”, “Why would they look at me?” and finally “I have NOTHING TO HIDE”. The implications and consequences of the Nothing to Hide logic in the era of Big Data have never been questioned. Ignoring this question prevents us from answering another: What kind of society are we building for ourselves and future generations?Silk Road: Drugs, Death, and the Dark Web – 2017The black market Web site known as the Silk Road emerges on the darknet in 2011; promising its users complete anonymity and total freedom from government regulation or scrutiny, Silk Road becomes a billion-dollar digital drugs cartel.Stare Into The Lights My Pretties – 2017Directed and written by Jordan Brown, Stare Into The Lights My Pretties is a fascinating, horrifying and thought provoking documentary film, exploring this uneasy new world around us and the dangers we face following our dependence on these machines.Thoughtcrime – 2017Directed by Bernd Riemann, this documentary compares the disturbing similarities between the disclosures made by former CIA employee Edward Snowden in 2013 and the world created by George Orwell in the dystopian science fiction film 1984, where independent thinking was censored and holding thoughts opposing those in power was considered a criminal act.Weapons of Mass Surveillance – 2017The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are subject to state-sponsored espionage. Governments with dubious human rights records are now using mass surveillance technology to tho… Read allAnon – 2018In a futuristic world where there is no crime and every citizen’s thoughts are recorded, a detective gets worried when he meets a young woman, whose records and data are absent.Assassination Nation – 2018In Salem, USA, four friends fight to survive when a malicious hacker exposes everyone’s secrets on the Internet and causes their town to descend into chaos.Black Code – 2018A look at the global impact the internet has on free speech, privacy and activism.Cam – 2018When her account is stolen by a look-alike, a cam girl sets out to unmask the mysterious woman and get her identity back.The Cleaners – 2018The hidden shadow industry of digital cleaning, where the internet rids itself of what it doesn’t like, such as violence, pornography and some political content.The Creepy Line – 2018The Creepy Line is a 2018 American documentary exploring the influence Google and Facebook have on public opinion, and the power the companies have that is not regulated or controlled by national governmentThe Defenders – 2018Produced by Cybereason, this documentary invites viewers inside the world of cybercrime, analyzing four of the most well-known cyberattacks throughout history — highlighted by commentary from those working to protect our institutions from the ever-changing cyber threat landscape. Digital Addicts – 2018Children as young as three are becoming addicted to mobile phones, harming their development and causing possible long-term damage. We follow some of the youngest cases and hear how our brains are affected by exposure to screens. Do You Trust This Computer? – 2018An exploration of the perils of artificial intelligence in the 21st Century. Self-learning computers could hold great potential for humanity or prove to be mankind’s final invention.Edward Snowden: Whistleblower or Spy? – 2018In 2013, Edward Snowden infamously leaked highly classified information from the NSA. Five years later, this documentary looks back at the sensational time through interviews with participants and witnesses, including some who are speaking out for the first time.The Feeling of Being Watched – 2018Assia Bendaoui sets out to investigate long-brewing rumors that her quiet, predominantly Arab-American neighborhood was being monitored by the FBI. When she’s investigating, she exposes a surveillance program on a scale no one could have imagined.General Magic – 2018The story of one of history’s most talented technology teams. From the first smartphones to social media, e-commerce, eBay and emojis, the ideas that now dominate the tech industry were born at General Magic, a 1989 Silicon Valley start-up.The Girl in the Spider’s Web – 2018Hacker Lisbeth Salander retrieves Firefall, a dangerous NSA computer programme. However, after mercenaries steal it from her, Lisbeth finds herself facing the underworld and Swedish law enforcement.Hacked – 2018After losing his job to a state-of-the-art supercomputer, a disgruntled computer technician decides to test his replacement. In the meantime, a group of hackers infiltrates the building to steal the new technology. Inside Facebook: Secrets of a Social Network – 2018Which is more important: money or morality? This eye-opening documentary takes viewers inside Facebook’s moderating hub, demonstrating how the social media company regulates harmful content, such as child abuse and hate speech — although the results prove to be more concerning than comforting.Inside the Russian Info War Machine – 2018Acclaimed journalist Paul Moreira investigates how Russia manipulates public opinion, undermines democratic governments and attempts to alter world events. The public face of foreign policy: the state news channels, Sputnik and Russia Today. But working in the shadows is the hidd… Read allIrumbu Thirai – 2018A military officer borrows money from a bank using fake papers for his sister’s marriage. However, when the money goes missing from his account, he begins an investigation that leads him to a hacker. Johnny English Strikes Again – 2018When a hacker breaks into the government database and exposes the active undercover agents in Britain, Johnny English is hired to catch the culprit.King of Crime – 2018Once a notoriously fierce crime lord, Marcus King now conducts his underworld dealings in cyberspace. But when his illegal online empire faces destruction, he must revert back to his old violent ways.Ocean’s 8 – 2018Debbie Ocean is released from jail after serving a prison sentence. She assembles a special crew of seven women to steal a diamond necklace, worth 150 million dollars, from the Met Gala.Peripheral – 2018Bobbi Johnson is a young literary sensation facing her difficult second novel. Already dealing with a crazed stalker and her junkie ex-boyfriend, Bobbi is convinced by her publisher to use new smart editing software and finds herself going head-to-head with an artificial intellig… Read allSearching – 2018David Kim files a police complaint in order to find his missing daughter, Margot. However, a string of hidden truths unravels when he checks her laptop.Unfriended: Dark Web – 2018When a teen finds a laptop with a cache of hidden files, he and his friend discover that the previous owner has access to the dark web and is watching over them.BD2K: Big Data to Knowledge – 2019Told through the stories of two patients battling disease in the information age, this documentary film explores how big data has changed the way medicine is practiced, as well as its effect on doctor-patient relationships. Cyber Crime – 2019In this documentary, 10 leading cybercrime experts discuss how billions of dollars a year are stolen or lost as a result of cybercrime, destroying businesses and lives. Dataland – 2019We’re only just scratching the surface of AI’s capabilities. This documentary shows us the breadth of latent potential being unleashed by the world’s top data scientists.The Great Hack – 2019Exploring how a data company named Cambridge Analytica came to symbolise the dark side of social media in the wake of the 2016 U.S. presidential election, as uncovered by journalist Carole Cadwalladr.HAK_MTL – 2019The Montreal hacker community, appalled by the meteoric rise of the surveillance society, is fighting for the democratization of the web and the protection of privacy.Hero or Villain? The Prosecution of Julian Assange – 2019Depending on who you’re talking to, the name Julian Assange will provoke one of two feelings: fury or awe. This documentary, led by the ABC Four Corners Team, chronicles an investigation into the founder of Wikileaks, featuring commentary from some of the individuals who knew him best. Kee – 2019Siddharth, a hacker who is blessed with a happy family, falls in love with a girl. However, his life changes drastically when he becomes a victim of cyberbullying that leads him to another hacker.Machine Learning: Living in the Age of AI – 2019Most people from the ages of 8 to 80 benefit from some form of artificial intelligence. From internet browsing to phone apps to car safety features, the technology informs many of the conveniences we embrace on a daily basis. Because the evolution of self-learning technologies continues to advance at such a rapid pace, it can be difficult to assess where it’s ultimately going and the extent to which it could alter our lives in the process. Machine Learning: Living in the Age of AI provides a lively and informative dissertation on the possibilities of this flourishing technology.Official Secrets – 2019Katharine Gun, a British intelligence specialist, leaks a secret memo to the press in order to avoid the Iraq invasion by the US and her government.Password – 2019To stop a criminal mastermind from hacking into official information and endangering human lives, a dutiful officer forms a team of ethical hackers and devises a master plan.The Secrets of Silicon Valley – 2019Jamie Bartlett investigates the untold story about Silicon valley’s technology cooperation plans of changing the world as we know it with disruption, and the problems which may come out of this exploration.Third Eye Spies – 2019Declassified details about ESP and how the CIA studied psychic abilities for use in spying for more than 20 years.Unfriends – 2019Unfriends Hindi Movie is a story of a Girl who is befriended by an unknown person of a violent character. How a boy a good Samaritan helps her get through her fight against cyber crime and Rape. How they both survive through calamities created by a politically powerful people who… Read allWannaCry: The Marcus Hutchins Story – 2019Marcus Hutchins is a cybersecurity hero who managed to stop the WannaCry worm in its tracks back in 2017, but in doing so he turned his life upside down, and in this YouTube documentary we hear him tell his story first hand.Who You Think I Am – 2019Claire, a 50-year-old divorced teacher, creates a fake Facebook profile of a 24-year-old woman. She finds a photo of a pretty young brunette online and uses it. She has created an entirely fictional character, but why? Originally she did it to spy on Jo, her on-and-off lover. But Jo only accepts friend requests from people he knows personally. To get to Jo, Claire sends his best-friend Chris a friend request and he accepts.You Can’t Watch This – 2019You Can’t Watch This follows the lives of five high profile conservatives and political dissidents banished from the online world. After introducing each character, the movie recounts how each person came to lose their access to social media and the affect it had on them. With th… Read all Mr. Robot – (2015 – 2019)Elliot, a cyber-security engineer suffering from anxiety, works for a corporation and hacks felons by night. Panic strikes him after Mr Robot, a cryptic anarchist, recruits him to ruin his company.Archive – 2020George Almore, a scientist, develops an AI with human capabilities in the hope of reuniting with his deceased wife. Though his latest prototype is almost ready, a new risk awaits.The Big Reset 2.0 – 2020Every day, AI grows more functional, intelligent, and capable of completing even the most complicated tasks, but at what point does it become too much? In this documentary produced by Germany’s international broadcaster, Deutsche Welle (DW), experts discuss the field’s ongoing battle between risk and reward. Childhood 2.0 – 2020Insight into the changing face of childhood in the highly vulnerable digital age with a special focus on the consequent problems faced by kids and parents.Cyberlante – 2020A mysterious young man moves to a new town to work in a low level job in an isolated hotel, run by an unsympathetic bully who has deadly secrets of his own.Enemies of the State – 2020An average American family becomes entangled in a bizarre web of espionage and corporate secrets when the U.S. government targets the family’s hacker son.Interference: Democracy at Risk – 2020From dark money and fake news to misinformation campaigns and vote tampering, the 2016 election opened our eyes to new threats against democracy. What can be done to keep 2020 from being a repeat?The Internet of Everything – 2020A disillusioned early adopter and internet evangelist, feels a sense of responsibility to engage with the problems the internet has created and wants to see where we went wrong.Julian Assange: Revolution Now – 2020Some see a terrorist – some see a journalist. This is an unparalleled look at the journey of how one man and his mission to empower the world with information became the target of the most powerful government in the world, the United States government. From coder to convict. This… Read allKill Chain: The Cyber War on America’s Elections – 2020From voter registration to counting ballots, data security expert Harri Hursti examines how hackers can influence and disrupt the U.S. election system.KnowBe4: The Making Of A Unicorn – 2020A Cybersecurity Story. How CEO Stu Sjouwerman built a culture of fun and a company worth $1 billion. With Chief Hacking Officer Kevin Mitnick. 23-minute documentary produced by Cybercrime Magazine.No Safe Spaces – 2020No Safe Spaces contends that identity politics and the suppression of free speech are spreading into every part of society and threatening to divide America.Out Of Dark – 2020This documentary contains rare and actual footage taken by a real-world spy operative here in the United States, while on mission. “Out of Dark” takes you into the areas of our society never accessed before. As we speak, there is a whole other world happening around us without ou… Read allPassword – 2020An IT employee is kidnapped in a secluded room and his legs are locked in an immovable chair. Along him in the room are a dead body and a laptop with an internet connection. The room is locked and the key is hanging in the door.Meanwhile he also trying ways to escape ,the plot re… Read all Screen Generation – 2020The generation dubbed as “Digital Natives”, born from 2011 onwards, consume the highest amount of screen time ever in the entire history of humanity. Kids aged ten and younger, preschoolers included, spend an average of four to six hours in front of a screen.The Social Dilemma – 2020Tech experts from Silicon Valley sound the alarm on the dangerous impact of social networking, which Big Tech use in an attempt to manipulate and influence.Tenet – 2020When a few objects that can be manipulated and used as weapons in the future fall into the wrong hands, a CIA operative, known as the Protagonist, must save the world.We Need to Talk About A.I. – 2020Taking a closer look at the future of artificial intelligence and the impact it will have on our world. As computers continue to evolve at an even greater speed, soon they will have the capacity to design and program themselves.Chakra – 2021An army officer sets out on a quest to bring down an infamous cybercriminal gang that is terrorising and robbing the city residents.Cryptopia: Bitcoin, Blockchains, And The Future Of The Internet – 2021A deep dive into the crypto ecosystem and blockchain technology reveals the good, the bad and the ugly of the controversial industry, its major narratives, conflicts and the major players behind it.Dark Web: Cicada 3301 – 2021A hacker and a cunning librarian soon find themselves in over their heads when they compete in a sophisticated dark web secret society’s global recruitment game.Dark Web: Fighting Cybercrime – 2021The fight against cybercrime takes center stage in this documentary highlighting the security industry and its ceaseless determination to defend against the growing number of digital threats.Dear Hacker – 2021Synopsis. The LED on my webcam started flashing for no reason. Is it possible that an observer, a hacker, a friend or ghost is currently housed in my webcam? I embark on a series of video-calls to find out what this elusive entity wants with me. Dear HackerDirected by Alice Lenay.MY.DOOM: Earth’s Deadliest [Computer] Virus – 2021First seen in 2004, MyDoom is universally acknowledged as the worst computer virus of all time, having caused over $38 billion in losses. This documentary explores MyDoom’s origins and chaotic run, all the while making an argument for just how essential white hat hackers really are.Hacker Fairies – 2021Two white hat hackers work with women to recover their stolen photos. When one of their clients asks them to teach her how to hack, they have to decide if they can trust her.Hacker: Trust No One – 2021Danny was set to be rich with his new crypto currency until he was caught hacking finding himself and his girlfriend on a hit list.Love Hard – 2021A columnist, who writes about her bad dating experiences, thinks she has met her perfect match on a dating app. When she flies across country to surprise him for Christmas, she learns she’s been catfished.The Perfect Weapon – 2021The rise of cyber conflict as the primary way nations now compete and sabotage each other.Silk Road – 2021Ross Ulbricht launches Silk Road, a virtual unregulated marketplace that facilitates sales of illegal items. Its success prompts DEA agent Rick Bowden to go undercover and take him down.The Mitchells vs The Machines – 2021The Mitchells, a dysfunctional family, must fight a robot apocalypse amidst their much-awaited road trip to save humanity.The Spy in Your Phone – 2021The story of how Israeli-made spyware Pegasus works, the hacking of journalists’ phones and its ominous consequences.Twenty Hacker – 2021Twenty Hacker tells the tale of Jae-Min, who lost his father after some hackers use ransomware to attack his company’s servers.WANNACRY: Earth’s Deadliest [Computer] Virus – 2021In the 21st century, using technology in day to day interactions and to carry out typical day to day activities is commonplace. Whenever something goes wrong with a device, it is usually cause for an immediate reaction. This happens because these devices have become so important in the modern-day lifestyle. Over the years, there have been a few memorable widespread issues that affected the devices of many individuals across the globe. You can Tell us what we’re missing.Related: All Hacking and Cyber Security Movies in One List (2000 – 2010)All Hacking and Cyber Security Movies in One List (1954 – 1999)About The Author Ankit Chaubey See author's postsRelated Hacking Reveals Hacking movies
Cyber Security WEBSITE FOOTPRINTING: Everything You Need to Know 7, January 20237, January 2023Website Footprinting helps those attackers whose main objective is to collect information about a company or a person. This information is related to the access of the company or person, related to his networks, related to security or to know about the vulnerabilities of the target. This growing information store… Read More
Exploits SQL injection using of SQLMAP 19, June 202219, June 2022TABLE OF CONTENTS1 What is sql injection ?2 What is SQLMAP ?3 Where can you use SQLMAP?3.0.1 Installing sqlmap command3.0.2 Open this link in your browser3.1 1. List information of existing database3.2 2. List information about Tables present in a particular Database 3.3 3. List information about the columns of a… Read More
Hacking Explaining ATM Jackpotting – What You Need to Know 30, December 202230, December 2022ATM jackpotting is the detection and exploitation of vulnerabilities in Automated Teller Machines (ATMs). These operations aim to force the machines to dispense all the cash in their reserves. If hackers are successful in breaching the ATM, they have the potential to clean out all the money inside of it…. Read More
Useful info. Fortunate me I found your site by accident, and I’m stunned why this coincidence did not took place earlier! I bookmarked it.Loading...Reply
Hi there! Do you use Twitter? I’d like to follow you if that would be ok. I’m absolutely enjoying your blog and look forward to new updates.Loading...Reply
Hi there! Do you know if they make any plugins to safeguard against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Any recommendations?Loading...Reply