A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
A mathematical genius discovers a link between numbers and reality, and thus believes he can predict the future.
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
A couple of months have passed since the serial murder case. A new dead body is found in the same area. Detective Manabu Kagaya tries to find the truth. He goes to see serial killer Yoshiharu Urano in prison.
In the late 90s, a video archivist unearths a series of sinister pirate broadcasts and becomes obsessed with uncovering the dark conspiracy behind them.
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
Every 15 seconds, a computer, network, or mobile device is hacked by cyber-terrorists. To combat this problem, Syntek Industries has manufactured data couriers designed from advanced machine robotics. These couriers are known as SYNCS. Syncs are programmed to securely deliver data packages without interruption.
When the dead discover a means to contact the living through electronic devices, cellphones and computers become open gateways to monstrosities and destruction.
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.
Mr. Takazawa, an elderly invalid who is cared for at his home by Haruko, a young nursing student, is chosen by the Japanese Ministry of Public Welfare to test the Z-001, a computerized hospital bed with robotic features that allegedly displays more efficiency and skills than any human nurse, but Haruko mistrusts a machine unable to consider human feelings.