Inside Job: How Banks Are Getting Hacked And What They Can Do

Banks Getting Hacked

The same engines or machines that generate spam – bots – are now sending those bots into banks to scour for ways inside the vault. Spam, the obnoxious stuff that everyone expects to be filtered out by “junk mail” filters, has become the Trojan horse of choice among cyber criminals. The BBC recently conducted a research project looking at the internet address blocks used by 12 of Britain’s most well-known and well-established financial institutions. In the course of their research, they discovered that in 2013 alone, there were more than 20 incidents within British banking networks involving malicious activity, despite banks having some of the strongest defenses against cyber-attacks (Source:

How Cyber Crooks are Cracking the Vault

Inside sources say that banking employee machines are routinely infected by malware. Multiple sources indicate that viruses, spam and other malicious messages regularly appear on banks’ corporate networks, most likely as a result of an employee or contractor encountering a bogus and booby-trapped email attachment, visiting an infected site, and (most likely) being enrolled in a “botnet” (a dragnet of hijacked computers used to mine a corporation’s computer systems). OpenDNS recently gathered statistics that suggest as many as 900 botnets were active in late 2013. The damage that can be wreaked through botnet breaches has many experts deeply concerned given that, “… as banks develop their controls in line with new criminal methodologies, new techniques will emerge”.

What Can Banks Do?

Banks are at the center of data security concerns. The information they gather intersects legal boundaries, intellectual property, and government regulations. To keep abreast of every potential security threat or virus is a virtually insurmountable feat, but, through data encryption – at rest and in the cloud – banking institutions could create a stronger security program than they may be currently using.

Studies show that institutions from finance to healthcare have high amounts of BYOD usage and often lack sufficiently strident data security policies for accessing data outside of corporate networks. Government-grade (FIPS 140-2 validated) data encryption solutions are recommended for all devices used to access and store data, be they BYOD (laptops, smartphones, tablets), as well as devices managed through an enterprise’s network (i.e., desktop computers). If the worst-case scenario should unfold, and a portable device carrying personally identifiable information (PII) is lost or stolen, data encryption via SEDs, for example, protects the encryption key by deleting it each time it is accessed, not storing it in the OS or network, and encrypting the encryption key independently – whether or not the company network is able to access it.

10+ Tips To Protect Your Webcam From Being Hacked

Gone are the days people used to believe webcams cannot be hacked and they cannot be compromised. Nope, webcams hacking is not only possible on movies based on hacking but also in real life. Now even a script kiddie can do that easily with the help of some software and social engineering tactics. If they get access to your computer through some form then they can easily hack your webcam. Hackers can get into your place easily, it is like crushing a paper for them, damn easy.

Why People Hack Webcams? What’s the benefit?

Actually there are several reasons why hackers hack your webcam, they are as follows:

  • For Peeping opposite sex and taking compromising pictures of them. Then later use it for blackmailing or lust purpose. They are infamously called as “Peeping Toms”.
  • Use those clips and pictures for Pornography. That is really sad, but true. They sell it for such sites and earn money.
  • Hack webcams to spy on their girlfriends or boyfriends. Evergreen reason!
  • To monitor your house and see when you are not in home. So that can break into your house and rob.

The Good News is that you can protect your webcam easily and you can do it now if you haven’t, because your privacy matters the most. Below you can find some essential tips to protect your webcam or prevent your webcam from getting hacked.

Basic Tips To Protect Your Webcam From Hacked

Here are some basic and recommended tips for protecting your webcam from hackers. Having good software + hardware makes things more comfortable.

Protect Your Webcam1. Enable Firewall: Firewalls are used to prevent unauthorized Internet users from accessing private networks connected to the Internet, maybe your own computer. Firewalls can be implemented in both hardware and software. Firewall is MUST since it can block/prevent any third-party access to your webcam.

Some free Firewalls for Windows which you can count on :

2. Use decent Antivirus: Every system should have a proper Antivirus to avoid all sorts of computer and internet security problems. We recommend Bitdefender, you can check our review about Bitdefender Antivirus Plus 2012.

3. Spyware Detection Program: Having a firewall and Antivirus is not enough, you’ll need a Spyware detection program to avoid someone spying on your webcam. You check CNET for free Spyware detection programs.

4. Use WEP, WPA, WPA2 or other security key: If you are using any wireless router or wireless webcam then enable the security key for that. Such security keys make hackers hard to get into. WEP Encryption is now kinda outdated. Simple things like this will secure your Wi-Fi connection and also secure the wireless network you have.

5. Keep your PC/Mac up-to-date: Regularly update the software in your computer. They will contain recent security fixes and are essential for your computer’s security.

6. Use Good Webcam: Choose a webcam that has good security features and buy a branded one if you can afford. Buy a webcam that has LED light and lens cover. The former is to identify whether the webcam is “ON” or “OFF” and the latter is to cover the webcam when it is not in use, old fashion but still worthy. You can buy a webcam which has Modesty Shield, it is like a visor which flips down over the lens when you don’t want the camera to see anything.

Good Webcams We Recommend :

  • Logitech HD Webcam C270
  • Logitech C260 Webcam
  • Microsoft LifeCam VX-3000 Webcam

Tip: Don’t forget to read your webcam’s instruction manual, this will make you much easier to find out how it actually works. Like when it turns OFF, when the light color changes and stuffs like that.

7. Use Good Router: You should also consider buying a reliable and secure wireless router. Nothing can replace a good router.

Some More Practical Tips To Avoid Hacking

Great! Now you have protected your webcam from getting hacked, but still if you are worried, you can just follow these practical real-life tips to avoid getting your webcam compromised.

8. Don’t use ‘unknown’ service centers: If you check this post you can see some case studies and instances where service centers compromise customer laptops and use it for their desire and money. So you should avoid strange and unknown service center for repairing your laptop or personal computer. You can approach the official service center if it is near-by. Scan your computer or laptop after getting it from the service center.

9. Don’t do anything ‘private’ in front of webcam: You can be mischief, but don’t try that in front of the webcam. You could be accidentally undressing or doing anything private with your webcam “ON”, so to avoid the risk keep your laptop or move away from that place when you are about to do something ‘private’.

10. Protect Your Associated Accounts: If your Yahoo! Messenger or Facebook account can be hacked, then the hacker could easily make sure of your webcam after hacking by using some tactics since both Yahoo! Messenger and Facebook have video chats.

Silly yet Simple Tips To Protect Yourself

If you are a not geeky type of person and want to solve this simply, then here are some simple tips for you.

11. Unplug the webcam when you don’t use it: So simple right? Instead of wasting all your precious time tweaking the settings you can simply unplug the webcam from the USB Port when you are not using it.

12. Turn it to face a wall when you don’t use it: How about turning the webcam to face the wall?

13. Use a tape to cover the lens: Though not really recommended, if you can uncomfortable with both #11 and #12 then you can count on this one.

14. Don’t keep your webcam in private area: I mean your computer + webcam, you can keep it somewhere like a normal separate room where you don’t do any other stuff. Even if your webcam is hacked, they won’t really get the benefit.

It is true that webcams can be hacked and you can protect your computer as well as your webcam in order to prevent it from being hacked. If you have any queries, kindly feel free to comment below.

6 Basic Things To Become A Good Hacker

Hacking had never been an easy work. Never! But still a lot of computer freaks want to be a hacker. Being a hacker is easy. What is tough is being a good hacker. Here I’m putting down some tips to be a good hacker. Having good skills in computers is an obvious thing that is required to be a hacker, so am not considering that below.


1. Keep up to date

You gotta stay tuned with what’s new in the software market. Keep browsing for the latest software that can help you in hacking. After all, technology and science has made things easier so make use of them. Newer is the technology, faster is the work.

2. Be patient

Patience is a quality that every hacker should have in him. As they say, Rome was not built in a day, so is the case with hacking. If you think hacking someone’s profile or something is a task of a day or two, I’m sorry to say that you are mistaken! Hacking requires patience and of course it keeps checking it too, for in some cases it may take about a week or two to hack a profile!

3. Be a good observer

This quality will help you in making guesses. A good observer is one who observes things very carefully and keeps them in mind for you never know what is next and whenever it’s gonna help you. So, whenever you visit someone’s ,let’s say, facebook profile, observe things carefully like what music, movies, pages on facebook, etc. does the person likes.

4. An excellent guess-maker

After capturing details of a person from his/her facebook profile, your main target to hack is his/her primary e mail address. There is the test which decides how good you are at making guesses. Well, I’m not saying that make guesses for the passwords, but you can try for answers of the security questions. And the details of that person have the maximum probability to have answers hidden in them.

5. Never neglect small things

By small things I mean the things that you may have never thought of paying any attention to them, this is where you are mistaken. Well, even a small and un-necessary detail about the individual can prove to be of a great worth later on. This thing is interlinked to the quality of being a good observer and thus to the guess-making.

6. An effective convincer

You should have very good convincing skills so that you can make your target to log in on your phisher. Well, it’s a bit tough task to convince the person on the other end, but yes if you are a high class convincer, you are half way through.

Always remember – While you are hacking don’t think of any kinda guarantee that you’ll surely penetrate through someone’s account or else. Sometimes you have to taste defeat too. As they say, where there’s a will, there’s a way, so, try for an alternate method. Like, if your guessing method has failed many times, go for phishing method. If that too fails, try remote key logger. Well, there are many ways to hack something and one of them will surely work unless your target is very intelligent and has a good knowledge of computers too.

Try avoiding – Being over-confident is what you are not supposed to be. Don’t ever underestimate your target and take him/her as a fool. Always plan for the future and for your alternate hacking method that you’ll choose if the current one fails. One more thing you should avoid is publicizing yourself and your hacking skills and techniques.
Mind it.

If you are a good hacker, everyone knows your name; but if you are great hacker, no one knows who you are!!!

This article is written by Bharat Chauhan. He likes coffee and Pepsi very much, cause those are very good source of caffeine instead of doing drugs. If you wish to write for us, kindly check this.

How A Hacker Can Actually Reach Your Place

An information from scratch can be used to gather certain information that can be really astonishing. Here in this post I will show you how a person can reach your place if  he/she has your IP address or domain name. Here I will demonstrate using a spam email which deliberately flooded my inbox  from a particular sender and show you how we can reach his house. So lets start….

Disclaimer: This post is actually to aware people about there online privacy rather misuse this trick.

Information Gathering :

  • From the email I got the “Domain Name” and name of the person and used it do the whois. As you all can see I got the address, phone no, fax etc from the image below. You can also use the IP address from the email header to obtain the information.

Whois of the domain name

  • Then I opened Google Maps to find the street view of the above obtained address. As you all can see I reached the street of the person and the desired place is approximately near to it.

Google map image

  • I will show you what more info I got, I used his name,city and country to find info about his family from here as shown below.

  • Then using his name and location in Google search I found his MySpace account as shown below and got to see his face.

Google search result


#1 – One should always use “Tor” like anonymous tools while browsing and especially using email accounts.

#2 – Keep the information of your Domain name set to private.

#3 – Keep the information on your Social Networking sites set to private.

#4 – Take care while sharing your Phone no or Fax no with any stranger or unknown website.

This guest article is written by Satyajit Das, Author and Owner of SecurityHunk. He is a 23 years old ethical hacking enthusiast and a part time blogger. If you wish to write for us, kindly check this.

Updated List Of Movies Based On Computers And Technology

[UPDATE] FULL LIST HERE – 40+ Movies Based On Hacking & Computer Technology

I picked up top movies based on computer hacking, security, science-fiction and in other similar categories (as of May 09) which triggered me into blogging in these categories. I found some similar posts in the blogosphere, but some interesting movies are missing there. Because those posts and articles are older. I decided to create a updated list of movies. I watched half of the mentioned movies and the rest are in my system, they are yet to watch. These movies are a must for die-hard fans of computer hacking and security. I learned lot of information from these movies, hope you too. I didn’t arrange these movies in rank order, they are arranged by year wise. I like to give credits to Yahoo ! Movies and Internet Movie Database (IMDb) for helping me gather information in their sites. If you feel that I really missed some interesting movies here, then you can mention it in the comments ! 🙂

ALSO CHECK : Movies Based On Robotics And Machines

1. The Conversation (1974)

The Conversation
The Conversation

Starring : Gene Hackman, Harrison Ford, Robert Duvall, John Cazale, Allen Garfield.

Direction : Francis Ford Coppola.

Production : Francis Ford Coppola, Fred Roos.

MPAA Rating : PG.

Story : A lone surveillance expert, with a meticulous devotion to his work and a policy of never getting personally involved in the jobs he’s given, finds himself slowly drawn into an assignment that he starts to detect has major ramifications.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

2. Tron (1982)

Tron (1982)
Tron (1982)

Starring : Jeff Bridges, Bruce Boxleitner, David Warner, Cindy Morgan, Barnard Hughes

Direction : Steven Lisberger

Distribution : Buena Vista Pictures

MPAA Rating : PG

Story : A hacker is literally abducted into the world of a computer and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

3. War Games (1983)

War Games (1983)
War Games (1983)

Starring : Matthew Broderick, Dabney Coleman, John Wood, Ally Sheedy, Barry Corbin

Direction : John Badham

Distribution : MGM Distribution Company

MPAA Rating : PG

Story : A young man finds a back door into a military central computer in which reality is confused with game-playing, possibly starting World War III.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

4. Cloak and Dagger (1984)

Cloak and Dagger (1984)
Cloak and Dagger (1984)

Starring : Henry Thomas, Dabney Coleman, Michael Murphy, Christina Nigra, John McIntire

Direction : Richard Franklin

Distribution : Universal Pictures

MPAA Rating : PG

Story : 11-year-old Davey, whose mother is dead and whose father doesn’t spend nearly enough time with him. So the boy loses himself in video games–and even has an imaginary friend, a super-resourceful secret agent. When he accidentally comes into possession of a spy group’s secret plans, and winds up on the run from them, he must learn to rely on himself and his imaginary pal to save his skin.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

5. Sneakers (1992)

Sneakers (1992)
Sneakers (1992)

Starring : Robert Redford, Sidney Poitier, Dan Aykroyd, David Strathairn, River Phoenix

Direction : Phil Alden Robinson, Glenn H. Randall Jr

Distribution : Universal Pictures

MPAA Rating : PG-13

Story : Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

6. Johnny Mnemonic (1995)

Johnny Mnemonic (1995)
Johnny Mnemonic (1995)

Starring : Keanu Reeves, Dina Meyer, Ice-T , Takeshi Kitano, Denis Akiyama

Direction : Robert Longo, Vic Armstrong

Distribution : TriStar Pictures

MPAA Rating : R

Story : A data courier, carrying a data package literally inside his head too large to hold for long, must deliver it before he dies from it.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

7. The Net (1995)

The Net (1995)
The Net (1995)

Starring : Sandra Bullock, Jeremy Northam, Dennis Miller, Diane Baker, Wendy Gazelle

Direction : Irwin Winkler, Buddy Van Horn

Distribution : Sony Pictures

MPAA Rating : PG-13

Story : Angela Bennett’s a software engineer type who works from home and has few friends outside of cyberspace. Taking her first vacation in years she becomes embroiled in a web (sic) of computer espionage.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

8. Hackers (1995)

Hackers (1995)
Hackers (1995)

Starring : Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard, Laurence Mason.

Direction : Iain Softley

Distribution : MGM Distribution Company

MPAA Rating : PG-13

Story : A boy is arrested by the US Secret Service for writing a virus & banned from using computers until he is 18. After 18, he and his new friends find a plot to unleash a dangerous computer virus. They must use their skills to find evidence, while pursued by Secret Service.

Also Check In : Yahoo ! Movies | Internet Movie Database (IMDb)

9. 23 (1998)

23 (1998)
23 (1998)

Starring : August Diehl, Fabian Busch, Dieter Landuris, Jan-Gregor Kremp

Direction : Hans-Christian Schmid

MPAA Rating : RA

Story : The plot of this movie (23) is based on the true story. It is about a group of young computer hackers from Hannover, Germany. The movie ’23’ is directed by Hans-Christian Schmid.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

10. Enemy Of The State (1998)

Enemy Of The State (1998)
Enemy Of The State (1998)

Starring : Will Smith, Gene Hackman, Jon Voight, Lisa Bonet, Regina King

Direction : Tony Scott

Distribution : Buena Vista Pictures

MPAA Rating : R for language and violence.

Story : A lawyer becomes a target by a corrupt politician and his NSA goons when he accidentally receives key evidence to a serious politically motivated crime.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

11. Pirates Of The Silicon Valley (1999)

Pirates Of The Silicon Valley (1999)
Pirates Of The Silicon Valley (1999)

Starring : Richard Waltzer, Melissa McBride, Rod Roeser, Gerald McCullouch, Brooke Radding

Direction : Martyn Burke

MPAA Rating : Not Rated

Story : Television movie based on the true-life visionaries whose battle to rule the fledgling computer empire changed the world. Focuses on the battle between rivals Steve Jobs of Apple Computer and Bill Gates of Microsoft.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

12. The Matrix (1999)

The Matrix (1999)
The Matrix (1999)

Starring : Keanu Reeves, Laurence Fishburne, Carrie-Anne Moss, Hugo Weaving, Gloria Foster

Direction : Larry Wachowski, Andy Wachowski, Bruce Hunt

Distribution : Warner Bros. Pictures

MPAA Rating : R for sci-fi violence and brief language.

Story : A computer hacker learns from mysterious rebels about the true nature of his reality and his role in the war against the controllers of it.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

13. Takedown (2000)

Takedown (2000)

Starring : Skeet Ulrich, Russell Wong, Scott Cooper, Tom Berenger, Percy ‘Master P’ P

Direction : Joe Chappelle

Distribution : Dimension Films

MPAA Rating : R

Story : This film is based on the stories and the capture of computer hacker Kevin Mitnick. Kevin Mitnick is quite possibly the best hacker in the world.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

14. Antitrust (2001)

Antitrust (2001)
Antitrust (2001)

Starring : Ryan Phillippe, Tim Robbins, Rachael Leigh Cook, Claire Forlani, Douglas McFerran

Direction : Peter Howitt, Liz Radley

Distribution : MGM Distribution Company

MPAA Rating : PG-13 for some violence and brief language.

Story : A computer programmer’s dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

15. Swordfish ( 2001)

Swordfish (2001)
Swordfish (2001)

Starring : John Travolta, Hugh Jackman, Halle Berry, Don Cheadle, Vinnie Jones

Direction : Dominic Sena

Distribution : Warner Bros. Pictures

MPAA Rating : R for violence, language and some sexuality/nudity.

Story : A secretive renegade counter-terrorist co-opts the world’s greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

16. Code Hunter/Storm Watch (2002)

Code Hunter (2002)
Code Hunter (2002)

Starring : Nick Cornish, Vanessa Marcil, Bai Ling, Tone Loc, Artis Ivey

Direction : Terry Cunningham

MPAA Rating : R

Story : America’s best player is being pulled in to the ultimate cyber-terror. The game’s mastermind has stolen his identity, put him on the FBI’s Most Wanted List, and is blackmailing him to take a part in a real twisted plan of world destruction. With just hours left, can the code be broken to save the world from total annihilation?

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

17. The Italian Job (2003)

The Italian Job (2003)
The Italian Job (2003)

Starring : Mark Wahlberg, Charlize Theron, Donald Sutherland, Dante ‘Mos Def’ Smith, Jason Statham

Direction : F. Gary Gray

Distribution : Paramount Pictures

MPAA Rating : PG-13 for violence and some language.

Story : Based on a 1969 Michael Caine film of the same name, thieves plan to pull of the heist of their lives by creating Los Angeles largest traffic jam ever.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

18. The Matrix Revolutions (2003)

The Matrix Revolutions (2003)
The Matrix Revolutions (2003)

Starring : Keanu Reeves, Laurence Fishburne, Carrie-Anne Moss, Hugo Weaving, Jada Pinkett Smith

Direction : Larry Wachowski, Andy Wachowski

Distribution : Warner Bros. Pictures

MPAA Rating : R for sci-fi violence and brief sexual content.

Story : The human city of Zion defends itself against the massive invasion of the machines as Neo fights to end the war at another front while also opposing the rogue Agent Smith.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

19. The Matrix Reloaded (2003)

The Matrix Reloaded (2003)
The Matrix Reloaded (2003)

Starring : Keanu Reeves, Laurence Fishburne, Carrie-Anne Moss, Hugo Weaving, Jada Pinkett Smith

Direction : Larry Wachowski, Andy Wachowski

Distribution : Warner Bros. Pictures

MPAA Rating : R for sci-fi violence and some sexuality.

Story : Neo and the rebel leaders estimate that they have 72 hours until 250,000 probes discover Zion and destroy it and its inhabitants. During this, Neo must decide how he can save Trinity from a dark fate in his dreams.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

The Net 2.0 (2006)
The Net 2.0 (2006)

20. The Net 2.0 (2006)

Starring : Nikki Deloach, Demet Akbag, Neil Hopkins (II)

Direction : Charles Winkler

Distribution : Winkler Films

MPAA Rating : NR

Story : The life of a young computer systems analyst is thrown into turmoil when, after arriving in Istanbul to start a new job, she finds her credit cards useless, her bank account empty, and her identity stolen.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

21. Transformers (2007)

Transformers (2007)

Starring : Shia LaBeouf, Tyrese Gibson, Josh Duhamel, Anthony Anderson, Megan Fox

Direction : Michael Bay

Distribution : DreamWorks and Paramount Pictures

MPAA Rating : PG-13 for intense sequences of sci-fi action violence, brief sexual humor and language.

Story : An ancient struggle re-erupts on Earth between two extraterrestrial clans, the heroic Autobots and the evil Decepticons, with a clue to the ultimate power held by a young teenager.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

22. Live Free or Die Hard 4.0 (2007)

Live Free or Die Hard (2007)

Starring : Bruce Willis, Timothy Olyphant, Maggie Q, Jeffrey Wright, Mary Elizabeth Winstead

Direction : Len Wiseman

Distribution : 20th Century Fox International

MPAA Rating : PG-13 for intense sequences of violence and action, language and a brief sexual situation.

Story : John McClane, with the help of a young hacker, takes on an Internet-based terrorist organization who is systematically shutting down the United States. Features cool gadgets like flexible keyboards.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

23. War Games : The Dead Code (2008)

War Games:The Dead Code (2008)
War Games : The Dead Code (2008)

Starring : Matt Lanter, Amanda Walsh, Colm Feore, Chuck Shamata, Maxim Roy

Direction : Stuart Gillard

Distribution : MGM Distribution Company

MPAA Rating : PG-13 for some violence and language.

Story : Computer hacker Will Farmer (Lanter) engages a goverment super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain glitches have turned made him become paranoid.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

24. Untraceable (2008)

Untraceable (2008)

Starring : Diane Lane, Billy Burke, Colin Hanks, Joseph Cross, Mary Beth Hurt.

Direction : Gregory Hoblit

Distribution : Sony Pictures

MPAA Rating : R for some prolonged sequences of strong gruesome violence, and language.

Story : FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

25. Gamer (2009)

Gamer (2009)

Starring : Gerard Butler, Kyra Sedgwick, Logan Lerman, Aaron Yoo, and Johnny Whitworth.

Direction : Mark Neveldine and Brian Taylor.

Production : David Scott Rubin, Michael Paseornek, and Mark Neveldine.

MPAA Rating : R for frenetic sequences of strong brutal violence throughout, sexual content, nudity and language.

Story : Set in the near future, a time when mind-control technology has taken society by storm. Humans control other humans in a mass-scale, multiplayer online game. Reclusive billionaire Ken Castle has created the controversial form of entertainment, “Slayers”.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

26. The Social Network (2010)

The Social Network Movie
The Social Network (2010)

Starring : Jesse Eisenberg, Justin Timberlake, Andrew Garfield, Joseph Mazzello and Armie Hammer.

Direction : David Fincher.

Production : Kevin Spacey and Scott Rudin.

MPAA Rating : PG 13 for sexual content, drug and alcohol use and language.

Story : A story about the founders of the social-networking website, Facebook. On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea.

Also Check In : Yahoo! Movies | Internet Movie Database (IMDb)

Love to watch movies with Subtitles? Then this list might be helpful to you.

20+ Sites To Download Subtitles for Movies and TV Series

Do you know any other movie based on computers, technology and hacking? Please share it in the comments!