Nowadays hacking is a well known phenomenon. Almost weekly we see news items about networks that are attacked. The trading of access to ones personal computer and webcam is less widely known, but the results can affect a computer user deeply personal. The simplicity of these hacks and the scale of it are disturbing. Are you already the slave of a RAT, or will you become one very soon?

The Italian Job (2003)
Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.

Swordfish (2001)
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.

The Girl with the Dragon Tattoo (2009)
Swedish thriller based on Stieg Larsson's novel about a male journalist and a young female hacker. In the opening of the movie, Mikael Blomkvist, a middle-aged publisher for the magazine Millennium, loses a libel case brought by corrupt Swedish industrialist Hans-Erik Wennerström. Nevertheless, he is hired by Henrik Vanger in order to solve a cold case, the disappearance of Vanger's niece

The Outsider (2015)
Revolves around a British military contractor Lex Walker who is told his daughter has died. When he arrives in Los Angeles and discovers the body is not hers, he begins an investigation.

Ghost in the Shell: Stand Alone Complex - Solid State Society (2007)
The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.

Owned (2002)
OWNED presents the 50 year history of the law-spurning tech tradition of hacking. This vibrant movement gained momentum in the 1960s with Captain Crunch and phone phreaking and now includes annual DefCon hacker conventions in Las Vegas (an amusing highlight of these is the fun game "Spot the Fed"). Kevin Mittnick, dubbed by the New York Times "FBI's Most Wanted Cybercriminal" speaks for the first time about the crimes that lead to his conviction. Misanthropic hacker Fuqrag casually wreaks havoc on government websites from a claustrophobic trailer in an anonymous trailer park.

Hackers (1995)
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Firewall (2006)
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.

Inside or Outside (2016)
Everyone has secrets they keep hidden, even from their loved ones. When Ouquan's wife gives birth to a child, Ouquan is certain the child is not his and suspects his wife of an affair. He discovers the other man is an unjustly imprisoned criminal, who is on the prowl for revenge and will stop at nothing to re-gain what he's lost.

Freedom Downtime (2001)
A feature-length documentary about the Free Kevin movement and the hacker world.

Antitrust (2001)
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.

Sneakers (1992)
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.

Pirat@ge (2011)
The documentary Pirat@ge traces the history of the Internet through the testimonies of those who built it: the hackers. It delves into the concerns of Generation Y, analyzing their networked communication methods, cultural consumption habits, and the sharing of such content.

Billion Dollar Heist (2023)
Global, dynamic, and eye-opening, this is story of the most daring cyber heist of all time, the Bangladeshi Central Bank theft, tracing the origins of cyber-crime from basic credit card fraud to the wildly complex criminal organisations in existence today, supported by commentary and fascinating insight from highly regarded cyber security experts.

The New Radical (2017)
Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.

The Girl Who Played with Fire (2009)
Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.