The Throwaways (2015)

Director
Tony Bui

Main cast
Peter Brooke; James Caan; Noel Clarke; Kevin Dillon; Katie McGrath

Genres
Action, Thriller, Fantasy

Description
Notorious hacker Drew Reynolds is captured by the CIA and given a proposition - work for them or spend the rest of his life in prison. Agreeing on the condition that he can form his own team, he puts together a group of "throwaways" - the people deemed expendable and seemingly the worst in the organization.


Similar movies

Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
John McClane is back and badder than ever, and this time he's working for Homeland Security. He calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
Two thieves, a magician, a computer hacker, a wannabe actor and a explosives expert plan a robbery to fulfill the dream of Victor Braganza. Will they be successful or will destiny have something different for them?
Hackers Wanted is an unreleased American documentary film. Directed and written by Sam Bozzo, the film explores the origins and nature of hackers and hacking by following the adventures of Adrian Lamo, and contrasting his story with that of controversial figures throughout history. The film is narrated by Kevin Spacey.
Thomas A. Anderson is a man living two lives. By day he is an average computer programmer and by night a malevolent hacker known as Neo, who finds himself targeted by the police when he is contacted by Morpheus, a legendary computer hacker, who reveals the shocking truth about our reality.
A man is released from prison to help American and Chinese authorities pursue a mysterious cyber criminal. The dangerous search leads them from Chicago to Hong Kong.
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking "black box" from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his "sneakers" must save themselves and the world economy by retrieving the box back from their blackmailers.
After taking a bullet to the head, Salander is under close supervision in a hospital and is set to face trial for attempted murder on her eventual release. With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander must prove her innocence. In doing this she plays against powerful enemies and her own past.
There will be an explosion exactly in 48 hours in Moscow. The information was provided by an agent who was killed this very second. All departments of special ops work on it, but the only hope is for recently organized independent team. They are a hacker girl who once broke thru Pentagon servers, a former special ops officer who enjoys speed and adrenalin, psychologist, a lady whose beauty outshines her intelligence and her rank of major, and a blind field engineer whose sense of smell and intuition substitute for his eye sight... And the Chief who got them all together and learned how to control them. Only this team is able to figure it out WHO, and most importantly WHERE, by knowing just WHEN...
In Stockholm, Sweden, hacker Lisbeth Salander is hired by Frans Balder, a computer engineer, to retrieve a program that he believes it is too dangerous to exist.
Deckard Shaw seeks revenge against Dominic Toretto and his family for his comatose brother.
After a tragic accident Luke Gibson is left with critical injuries and complete amnesia. A new technological breakthrough from the Hexx Corporation - a Psi-Comp Implant that's hardwired into Luke's brain - saves his life, but Luke soon finds out that this new technology comes with a price and that the Hexx Corporation harbors sinister plans for the new device.
A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
political thriller that charts the exploits of disillusioned ex-hacker Terell Lessor. A return to New York, coupled with a humiliating attempt at getting a new job, serves as the catalyst for him to take action against those who slighted him in the past. Employing strategically placed spy-cams, and operating in tandem with backer, strategist and lover Olivia, he captures compromising footage and broadcasts the edited clips via a newly-minted website. Recognizing the power of their model, the two begin to target CEOs, politicians, those who represent the worst of the establishment. Soon Terell's every move is front-page news, law enforcement is after him, and copy-catters are taking his abduction-and-confession model to extremes he never imagined. With these forces colliding, Terell has to decide whether his actions are sustainable - a decision that will compromise his agenda, his first taste of romance, and his physical wellbeing.
Hotshot Washington lawyer Robert Dean becomes a victim of high-tech identity theft when a hacker slips an incriminating video into his pocket. Soon, a rogue National Security agent sets out to recover the tape -- and destroy Dean.
FAA system analyzer named Neil McCabe is the only person who seems to have this different hunch towards a group of international terrorists after a horrific plane incident occured. He thinks that an evil genius computer hacker sets out and manipulate the computer electronical system which linked to several airplanes to cause destruction and tragedy. In order to prevent the mishap, McCabe and his teammate, Rudy, finds out about the machine used by the criminals which leads them to a psychotic thrilling fight between the terrorist.
In the near future, Major is the first of her kind: a human saved from a terrible crash, then cyber-enhanced to be a perfect soldier devoted to stopping the world's most dangerous criminals.
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
Nick is excited to discover that he's won a dinner date with his favorite actress, Jill Goddard. But when Jill refuses to honor the contest, he receives an offer he can't refuse: the ability to view Jill secretly via computer. Nick begins watching the unknowing star on her webcam, not realizing that this decision will put both himself and Jill at risk as they enter a terrifying world of cat-and-mouse where nothing-and no one-are as they seem.
Ji-hyuk is an expert safe-cracker who lives the highlife stealing antiques and jewelry with his team. CHO, a powerful and cruel gang boss threatens them to steal $150 million with him. Ji-hyuk plans to get revenge on CHO, but ends up falling into his trap. However, CHO later realizes it was all part of Ji-hyuk’s scheme. When Ji-hyuk, who was thought dead, reappears, hidden secret relations between the technicians also surface.
Angela Bennett is a freelance software engineer who lives in a world of computer technology. When a cyber friend asks Bennett to debug a CD-ROM game, she discovers a conspiracy that will turn her life upside down. Soon, her records have been erased, and she's been given a new identity and a police record. Her vacation is ruined as she struggles to determine why she's been deleted from society.
In a futuristic world, Michelle lives everyday battling with DNA Hackers who use their skills to hack into people's bodies and kill them. She is an assassin, trying to keep her younger brother, Jackie, out of trouble. When Jackie gets involved in a petty crime of robbery, he propels himself into the world of DNA Hackers, Shylocks (Loan Sharks) and Gangs
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
A.D. 2400, DEVA's central council detects an incident of unauthorized access into their mainframe. Someone on Earth was trying to hack into the system. The only information DEVA was able to retrieve was that hacker referred to themselves as "Frontier Setter." To investigate the mysterious hacker's motives, the high officials of DEVA dispatch system Security Third Officer Angela Balzac to the Earth's surface. Equipped with a prosthetic "material body," Angela attempts to make contact with a local agent Dingo, but what awaited her instead was a swarm of Sandworms now infesting the Earth's surface. Angela intercepts the gruesome pests with her exoskeleton powered suit Arhan.
In the year 2029, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop a highly-wanted hacker known as 'The Puppetmaster'. Ghost in the Shell 2.0 is a reproduced version of its original 1995 counterpart. Among a numerous enhancements, for the film's 2.0 release, were a number of scenes were overhauled with 3D animation, visual improvements, and soundtrack rerecorded in 6.1 surround sound.
In the year 2029, the barriers of our world have been broken down by the net and by cybernetics, but this brings new vulnerability to humans in the form of brain-hacking. When a highly-wanted hacker known as 'The Puppetmaster' begins involving them in politics, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop the Puppetmaster.
A disgruntled Mexican cop is forced to work with a teenage hacker to hunt down the criminals who killed his wife, and dismantle their operation.
As his wedding day approaches, Ben heads to Miami with his soon-to-be brother-in-law James to bring down a drug dealer who's supplying the dealers of Atlanta with product.
Mars. Days before Halloween 2071. Villains blow up a tanker truck on Highway One, releasing a deadly virus that kills hundreds. Fearing a bigger, even more devastating biochemical attack, an astronomical reward is offered for the arrest and capture of the person behind the destruction. On the space ship "Bebop," Spike Spiegel and his crew of bounty hunters (Jet Black, Faye Valentine, Ed and Ein) are bored and short of cash. But with the news of the reward everything changes....
Canadian Bacon is the only fictitious film from Director Michael Moore. This comedy is about an American president who decides to go to war to bring the public’s opinion of him up during election time. Canadian Bacon is actor John Candy’s last film.
Bill Pope is a CIA agent on a mission in London tracking down a shadowy hacker nicknamed "The Dutchman." When he gets mysteriously ambushed and killed, an experimental procedure is used to transfer his memories into dangerous ex-convict Jericho Stewart. When he wakes up with the CIA agent's memories, his mission is to find The Dutchman and eliminate him before the hacker launches ICBM's and starts World War III. But complications soon arise and the mission turns personal.
Six would-be thieves enter a prestigious dance competition as a cover for their larger goal of pulling off a major heist
To catch Interpol's most-wanted hacker, special Agent Dada must assemble a team of criminals: Jack-The Trickster; Vi-The Hacker; Luhan-The Forger; Linh-The Cat Burglar and Phuc-The Inside Man. The latest action-comedy-heist movie of director Ham Tran. Starring Suboi, Petey Majik Nguyen, Thanh My, Nhung Kate, Mai The Hiep, introducing Thanh Pham and special guests Ngo Thanh Van, Teo Yoo.
The USA is attacked by a large group of well organized terrorists who communicate through a computer network via satellite. A bunch of highschool kids has hacked the password and gained access. Believing it's a game they unknowingly cause terror acts all over the country. An anti-terror force fights against the terrorists.
Three tornadoes converge to wreak havoc on Chicago, disrupting the power grid and creating the worst super-storm in history: a category 6 twister.
Igor, Max and Zhenya are members of Network Keepers - a secret organization of hackers...
Corky Romano is a bumbling, simpleton, veterinarian and the youngest, outcast son of an aging gangster, named Pops Romano, who calls upon Corky to infiltrate the local FBI and retrieve and destroy evidence being used to incriminate Pops for racketeering charges.
The action of this story begins in the near future. The great device codenamed as the “Phantom” is invented by the Global Security Corporation in order to eliminate the crime and to establish a secure global community. But, it is not how it really is. The reverse side of the “Phantom” is to establish an absolute control over people’s minds. The Corporation aims to change the course of the history, by gaining the community of obedient “puppets”, who would never realize that their minds are being controlled. Step by step, the “Phantom” fractures people’s lives, but nobody suspects anything, until it destroys the lives of in-love couple- Timur and Keira. She is convicted of murder, and he needs to break the law to save her. An American criminal hacker named Zach helps Timur to find the truth, and to uncover the Corporation’s conspiracy.
The story is set in 2027, one year after the end of the fourth non-nuclear war. New Port City is still reeling from the war's aftermath when it suffers a bombing caused by a self-propelled mine. Then, a military member implicated in arms-dealing bribes is gunned down. During the investigation, Public Security Section's Daisuke Aramaki encounters Motoko Kusanagi, the cyborg, wizard-level hacker assigned to the military's 501st Secret Unit. Batou, a man with the "eye that does not sleep," suspects that Kusanagi is the one behind the bombing. The Niihama Prefectural Police detective Togusa is pursuing his own dual cases of the shooting death and a prostitute's murder. Motoko herself is being watched by the 501st Secret Unit's head Kurutsu and cyborg agents.
In the short end of pregnancy, a samba singer sees herself shared between two men that believes to be the father of her baby. Duelling men: a militiaman, a hacker and Shirley, a cross-dresser, best friend of the singer, who really plays the role of head on that family. Dreams, love, jealousy, life and death. Like in our songs.
Hacker's Game is a love story between two hackers, Soyan and Loise. Like many other hackers, Soyan works for a company he previously hacked. This "online security" firm runs covert activities for high-profile clients around the world. Loise is a cyber-detective who investigates war crimes for a human rights organization. Obsessed with the truth, she also has spent years searching for an unknown person. The two hackers meet on a rooftop and bond together through a virtual chess game. But Soyan's employer, Russell Belial, has asked him to protect the same arms-dealer that Loise is determined to help to capture. Who will call the game now? What is Soyan's real goal? The pair embarks upon an intense but dangerous romance, playing an elaborate game of deception. After being in a virtual world, will Soyan and Loise risk everything for true love?
When Delhi Police comes across an unusual case revolving around hacking they seek help of an expert who thinks like them only to come across a lazy hacker Mickey Arora.
When their computer hacker friend accidentally channels a mysterious wireless signal, a group of co-eds rally to stop a terrifying evil from taking over the world.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
This English-language adaptation of the Swedish novel by Stieg Larsson follows a disgraced journalist, Mikael Blomkvist, as he investigates the disappearance of a weary patriarch's niece from 40 years ago. He is aided by the pierced, tattooed, punk computer hacker named Lisbeth Salander. As they work together in the investigation, Blomkvist and Salander uncover immense corruption beyond anything they have ever imagined.
A hacker has adventures.
A freelance computer hacker discovers a mysterious government computer program. He breaks into the program and is thrust into a revolution.
A chilling real-time thriller featuring a teenager, Casey, battling with an anonymous cyber-stalker.
Samuel works in Brussels as a pharmaceutical delivery man. His gorgeous girlfriend Mireille heads off to New York to intern at a prestigious architecture firm. Shortly after her departure, Sam's computer is hacked. A series of rather dodgy IT-guys fail to protect his wireless network. The mysterious hacker seems intent on screwing up Samuel's life and his relationship with Mireille. Paranoia kicks in. Sam starts to suspect his neighbors and gets obsessed with WiFi-rays... Love, paranoia and two lovers separated by an ocean of communication devices.
High School student David Lightman (Matthew Broderick) has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Defense Department's war computer and initiates a confrontation of global proportions! Together with his girlfriend (Ally Sheedy) and a wizardly computer genius (John Wood), David must race against time to outwit his opponent...and prevent a nuclear Armageddon.
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
The sequel to the low budget first film ‘Cube.’ This time the prisoners find them selves in a more advanced cube environment that they must escape from before they are killed. A science fiction film where space and time have more than one path.
Three college students on a road trip across the Southwest experience a detour – the tracking of a computer genius who has already hacked into MIT and exposed security faults. When the trio find themselves drawn to an eerily isolated area, suddenly everything goes dark. When one of the students regains consciousness, he finds himself in a waking nightmare.
Alex, an immigrant from Ukraine comes to Canada and becomes involved with an online criminal organization called Darkweb. What starts off as a way to help his parents financially, soon becomes a personal vendetta against the entire banking system, when his mother is fired from her job at the bank
A look at the relationship between WikiLeaks founder Julian Assange and his early supporter and eventual colleague Daniel Domscheit-Berg, and how the website's growth and influence led to an irreparable rift between the two friends.
A detective infiltrates into one of the biggest gang organizations in the country and gets involved in a fight for the heir to the gang after the boss dies and in between the second in charge who trusts him with his life and the high police officials who think of him only as bait.
Two young women arrive at a curious penthouse apartment, led by one's crush on her tutor. However, her love interest doesn't live alone. He's part of a trio of computer hackers about to embark on the ultimate job on the world's most mysterious mainframe. Whilst doing so, they unlock more than they bargain for with supernatural and ultimately fatal results. Can this seemingly insignificant chain of events, which have thrown this group together, be construed as fate? Can the beacon provide a signal of hope or is it a web of manipulation, paranoia and ultimately... murder?
Pinhead returns to terrorize computer hackers who have opened a virtual Lament Configuration on the website Hellworld.com.

© Valossa 2015–2024