Movies about computer hacker - not very popular category. We know 269 this movies.
Including such famous ones as
"True Lies", 1994
"Hackers", 1995
"Sneakers", 1992
"Ghost in the Shell 2.0", 2008
"The Matrix", 1999
and etc.
These are the most popular ones but just because a lot of people have watched them doesn't mean you should watch them.
To find movies,
which you won't be disappointed,
fill out a short form
and/or rate several films,
and filmAdviser will pick you up
movies about computer hacker
according to your taste
among those
269 ,
which we know.
We will not only help you choose movie,
but we’ll also tell you where it is watch for free in russian
A fearless, globe-trotting, terrorist-battling secret agent has his life turned upside down when he discovers his wife might be having an affair with more
A fearless, globe-trotting, terrorist-battling secret agent has his life turned upside down when he discovers his wife might be having an affair with a used car salesman while terrorists smuggle nuclear war heads into the United States. close
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers more
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus. close
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black more
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers. close
In the year 2029, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop a highly-wanted hacker known as 'The Puppetmaster'. more
In the year 2029, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop a highly-wanted hacker known as 'The Puppetmaster'. Ghost in the Shell 2.0 is a reproduced version of its original 1995 counterpart. Among a numerous enhancements, for the film's 2.0 release, were a number of scenes were overhauled with 3D animation, visual improvements, and soundtrack rerecorded in 6.1 surround sound. close
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth. close
A wealthy entrepreneur secretly creates a theme park featuring living dinosaurs drawn from prehistoric DNA. Before opening day, he invites a team of experts more
A wealthy entrepreneur secretly creates a theme park featuring living dinosaurs drawn from prehistoric DNA. Before opening day, he invites a team of experts and his two eager grandchildren to experience the park and help calm anxious investors. However, the park is anything but amusing as the security systems go off-line and the dinosaurs escape. close
After security expert Ray Breslin is hired to rescue the kidnapped daughter of a Hong Kong tech mogul from a formidable Latvian prison, Breslin's girlfriend more
After security expert Ray Breslin is hired to rescue the kidnapped daughter of a Hong Kong tech mogul from a formidable Latvian prison, Breslin's girlfriend is also captured. Now he and his team must pull off a deadly rescue mission to confront their sadistic foe and save the hostages before time runs out. close
Set in the year 2005, a division of the FBI, called "NetForce" has been initiated to investigate Internet crime. A Bill Gates-type character finds a loophole more
Set in the year 2005, a division of the FBI, called "NetForce" has been initiated to investigate Internet crime. A Bill Gates-type character finds a loophole in his new web browser which enables him to gain control of the Internet. Net-Force, headed by Kristofferson and Bakula's characters set out to stop him. close
During a routine prison work detail, convict Piper is chained to Dodge, a cyberhacker, when gunfire breaks out. Apparently, the attack is related to stolen more
During a routine prison work detail, convict Piper is chained to Dodge, a cyberhacker, when gunfire breaks out. Apparently, the attack is related to stolen money that the Mafia is after, and some computer files that somebody wants desperately to bury. The pair, who don't exactly enjoy each other's company, escape and must work together if they are to reach Atlanta alive. Luckily, they meet a woman who may be willing to help them. close
Los Angeles. A wealthy man, known as Mr. Fuller, discovers a shocking secret about the world he lives in. Fearing for his life, he leaves a desperate more
Los Angeles. A wealthy man, known as Mr. Fuller, discovers a shocking secret about the world he lives in. Fearing for his life, he leaves a desperate message for a friend of his in the most unexpected place. close
A depressed white-collar worker tries hypnotherapy, only to find himself in a perpetual state of devil-may-care bliss that prompts him to start living more
A depressed white-collar worker tries hypnotherapy, only to find himself in a perpetual state of devil-may-care bliss that prompts him to start living by his own rules, and hatch a hapless attempt to embezzle money from his soul-killing employers. close
In the year 2029, the barriers of our world have been broken down by the net and by cybernetics, but this brings new vulnerability to humans in the form more
In the year 2029, the barriers of our world have been broken down by the net and by cybernetics, but this brings new vulnerability to humans in the form of brain-hacking. When a highly-wanted hacker known as 'The Puppetmaster' begins involving them in politics, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop the Puppetmaster. close
A daring prison break from an airliner at 30,000 feet leaves U.S. Marshal Pete Nessip mourning a brother and gunning for revenge. After being ordered more
A daring prison break from an airliner at 30,000 feet leaves U.S. Marshal Pete Nessip mourning a brother and gunning for revenge. After being ordered to turn in his badge, he seeks out Jessie Crossman, a noted skydiver, and offers to sponsor her crew for the annual Independence Day parachuting show in Washington, D.C., if she trains him. Meanwhile, the mastermind behind the mid-air jailbreak is planning a daring computer theft on Independence Day. close
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he more
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that... close
UN agents Mike Graham and Sabrina Carver are sent by their director Nick Caldwell to investigate the theft of Rembrandt's painting, "The Night Watch". more
UN agents Mike Graham and Sabrina Carver are sent by their director Nick Caldwell to investigate the theft of Rembrandt's painting, "The Night Watch". The trail takes them from Amsterdam to Hong Kong and involves them in not only art theft and forgery, but the high-tech schemes of Martin Schraeder and his Korean cohort Mao Yixin close
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the more
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released. close
When the videotape of the murder of a congressman unknowingly ends up in the hands of labor lawyer and dedicated family man Robert Clayton Dean, he is more
When the videotape of the murder of a congressman unknowingly ends up in the hands of labor lawyer and dedicated family man Robert Clayton Dean, he is framed for the murder. With the help of the mysterious Brill, Dean attempts to throw the NSA off his trail and prove his innocence. close
When a powerful Russian satellite weapon is hijacked by a mysterious crime syndicate, it's up to James Bond, with the help of programmer Natalya Simonova, more
When a powerful Russian satellite weapon is hijacked by a mysterious crime syndicate, it's up to James Bond, with the help of programmer Natalya Simonova, to find the culprits and save the world from disaster. close
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. more
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. After decoding the message, Terry becomes embroiled in an espionage ring. People are killed, and Terry is chased. Throughout, she remains in contact with this mysterious person, who needs Terry's help save his life. close
When a sexy, high-end escort holds the key evidence to a scandalous government cover-up, two bumbling young detectives become her unlikely protectors more
When a sexy, high-end escort holds the key evidence to a scandalous government cover-up, two bumbling young detectives become her unlikely protectors from a ruthless assassin hired to silence her. close
Two unpopular teenagers, Gary and Wyatt, fail at all attempts to be accepted by their peers. Their desperation to be liked leads them to "create" a woman more
Two unpopular teenagers, Gary and Wyatt, fail at all attempts to be accepted by their peers. Their desperation to be liked leads them to "create" a woman via their computer. Their living and breathing creation is a gorgeous woman, Lisa, whose purpose is to boost their confidence level by putting them into situations which require Gary and Wyatt to act like men. close
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, more
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan. close
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests more
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB. close
Abby Turner has it all: brains, looks and a terrific job as the lead Internet security designer at Custodis Systems. But when her seemingly perfect boyfriend more
Abby Turner has it all: brains, looks and a terrific job as the lead Internet security designer at Custodis Systems. But when her seemingly perfect boyfriend - Josh Lawson - is murdered, Abby's world is turned upside down. Caught in a web of devious schemes and deadly betrayals, Abby must rely on her quick wits and analytical skills - and practise a little deception of her own - if she's to survive the deadly "Web of Lies" close
A mysterious woman recruits bank teller Ludwig Dieter to lead a group of aspiring thieves on a top-secret heist during the early stages of the zombie apocalypse.
A mysterious woman recruits bank teller Ludwig Dieter to lead a group of aspiring thieves on a top-secret heist during the early stages of the zombie apocalypse. close
A disgruntled former employee hijacks the Seabourn Legend cruise liner. Set on a fixed course, without any means of communication and at the mercy of more
A disgruntled former employee hijacks the Seabourn Legend cruise liner. Set on a fixed course, without any means of communication and at the mercy of the hijacker, it's up to the one cop on vacation, and his soon to be fiancé (hopefully) Annie, to regain control of it before it kills the passengers and causes an environmental disaster. Insurmountable and daunting tasks awaits them on their perilous journey throughout the ship trying to fend off the hijacker and save the passengers. close
1 from 9
If you were registered, you should have seen the full description right here...