Sentinel 2024 - Movies (Jan 15th)
Out Come the Wolves 2024 - Movies (Jan 15th)
Sebastian 2024 - Movies (Oct 2nd)
Hounds of War 2024 - Movies (Oct 2nd)
A Quiet Place Day One 2024 - Movies (Oct 2nd)
Cabrini 2024 - Movies (Oct 2nd)
Diddy Summit to Plummet 2024 - Movies (Jan 14th)
Powder Pup 2024 - Movies (Jan 14th)
Den of Thieves 2 Pantera 2025 - Movies (Jan 14th)
Diddy The Making of a Bad Boy 2025 - Movies (Jan 14th)
Ari Shaffir Americas Sweetheart 2025 - Movies (Jan 14th)
Queer 2024 - Movies (Jan 14th)
Bloody Axe Wound 2024 - Movies (Jan 14th)
Man with No Past 2025 - Movies (Jan 14th)
Kraven the Hunter 2024 - Movies (Jan 14th)
Resynator 2024 - Movies (Jan 13th)
Memoir of a Snail 2024 - Movies (Jan 13th)
Lick 2024 - Movies (Jan 13th)
Singing in My Sleep 2024 - Movies (Jan 13th)
Ghost Cat Anzu 2024 - Movies (Jan 13th)
Daniel Sloss Hubris 2024 - Movies (Jan 12th)
Deal or No Deal - (Jan 15th)
Family Feud Canada - (Jan 15th)
Tyler Perrys The Oval - (Jan 15th)
Allegiance - (Jan 15th)
Ishura - (Jan 15th)
Wild Cards - (Jan 15th)
Rip Off Britain - (Jan 15th)
The One Show - (Jan 15th)
PopMaster TV - (Jan 15th)
Gutfeld - (Jan 15th)
Hannity - (Jan 15th)
Jesse Watters Primetime - (Jan 15th)
Special Report with Bret Baier - (Jan 15th)
The Five - (Jan 15th)
The Ingraham Angle - (Jan 15th)
The 11th Hour with Stephanie Ruhle - (Jan 15th)
The Chase Australia - (Jan 15th)
Married at first sight - (Jan 15th)
Watch What Happens Live with Andy Cohen - (Jan 15th)
The Chocolate Queen - (Jan 15th)
Stuxnet was malware that flashed around the world via Microsoft computers, triggering arbitrary BSODs and random reboots. In 2010 cybersecurity firms captured and began analyzing the worm. Stuxnet (name derived from merging two random lines in the code) had digital certificates. Digital certificates require biometrics (human identification) and pass codes. But Stuxnet could attain access without that. It ominously coded multiple zero days exploit. Symantec's investigators see maybe one a year, looking at thousands of lines of code. Stuxnet had four. As we learn in the documentary, it also had undoubtedly stolen product identity codes for PLCs (programmable logic controls) from Siemens. Where were these PLCs? Installed on centrifuges at Natanz, an Iranian nuclear site. And the game's afoot. Whose program? To what purpose? Gibney does an excellent job of gearing us up for the technowizardry with hunter/seekers Eric Chien and Liam O'Munchu (Symantec) as geek guides to the nation-state business of cyber espionage and, as General Michael Hayden, former CIA and NSA director calls it, the "hideously classified" world of cyber weaponry. We meet the journalists, bench players and sideline government officialdom who were not a part of, or even aware of, Stuxnet. The documentary is a mild, entertaining but serious call to start a dialogue about cyber weapons and deployment of same. How do countries begin to arbitrate treaties regarding use of life-threatening coding? Filmed well, the effects shrouding the unnamed informant are great viewing. The on-camera personnel are well-chosen, entertaining and as informative as they're able to be. There are enough tech buzzwords to keep nontechs like me interested, and enough about how dangerous coding with a mission to DISRUPT DEGRADE DESTROY can be for those of us who count on critical infrastructure systems.
A college student searches for justice after she discovers deepfake pornography of herself circulating online.
In advance of the 2020 Presidential election, Kill Chain: The Cyber War on America's Elections takes a deep dive into the weaknesses of today's election technology, investigating the startling vulnerabilities in America's voting systems and the alarming risks they pose to our democracy.
OWNED presents the 50 year history of the law-spurning tech tradition of hacking. This vibrant movement gained momentum in the 1960s with Captain Crunch and phone phreaking and now includes annual DefCon hacker conventions in Las Vegas (an amusing highlight of these is the fun game "Spot the Fed"). Kevin Mittnick, dubbed by the New York Times "FBI's Most Wanted Cybercriminal" speaks for the first time about the crimes that lead to his conviction. Misanthropic hacker Fuqrag casually wreaks havoc on government websites from a claustrophobic trailer in an anonymous trailer park.
While reporting on the rise of spy cam porn in South Korea, a crime that affects thousands each year, a journalist discovers that she too is being watched in her own home. She decides to speak out, joining a nationwide movement of women seeking protection from this frighteningly ubiquitous crime.
Unauthorized Access is one of the earliest independent documentaries on the subject of the computer underground. Shot in 15 cities and 4 countries, this documentary offers an impressive array of topics dealing with hacking culture, such as phreaking, lockpicking, conspiracy theories, and ninja clad dumpster divers.
Hacking at Leaves documents artist and hazmat-suit aficionado Johannes Grenzfurthner as he attempts to come to terms with the United States' colonial past, Navajo tribal history, and the hacker movement. The story hones in on a small tinker space in Durango, Colorado, that made significant contributions to worldwide COVID relief efforts. But things go awry when Uncle Sam interferes with the film's production.
Their crimes earned them the nickname Bitcoin Bonnie and Clyde — and the story only gets weirder in this documentary about the most lucrative heist ever.
The Secret History of Hacking is a 2001 documentary film that focuses on phreaking, computer hacking and social engineering occurring from the 1970s through to the 1990s. Archive footage concerning the subject matter and (computer generated) graphical imagery specifically created for the film are voiced over with narrative audio commentary, intermixed with commentary from people who in one way or another have been closely involved in these matters.
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.