
The Click
Genres
Overview
Melissa lives with her sick mom and works a repetitive job at a supermarket. She belongs to a forum of White Hat Hackers who get paid to solve cybercrime cases, all the while investigating her father’s mysterious disappearance. When an old acquaintance offers Mel a lucrative job hacking elite cybercrime gang The Click, she’s reluctant to get involved, but when her mother’s condition worsens, stress gets the better of Mel and she takes the job.
Details
Budget
$0
Revenue
$0
Runtime
15 min
Release Date
2022-01-30
Status
Released
Original Language
English
Vote Count
0
Vote Average
0
Esther Ukata
Melissa Godwin
Maria Olu
Mrs Godwin
Joseph Sule
Mr Godwin
Rejoice Josiah
Middle Melissa
Sandyep Kambai
Little Melissa
Michael Adebayo
Hakeem
Akorede Emmanuel
Akorede
Donald Diggah
Nurse Clement
Ezirike Christabel
Mrs Felicia
Nations Bako
Mrs Felicia's son
David Ochaju
Hacker #1
Sharon Bello
Hacker #2
Beauty Danladi
Hacker #3
Elijah Oyedele
Hacker #4
Dyem Abel
Hacker #5
Phil Badung
News reporter #1
Deborah Johnson
News reporter #2
6.1
Antitrust
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
2001-01-11 | en
5.8
Stay Alive
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!
2006-03-24 | en
6.5
Naked: The Net Never Forgets
16-year-old Lara takes nude photos for her boyfriend, which soon flood social media. Lara's phone has been hacked, the photos published, and she's being blackmailed.
2017-04-04 | de
5.0
Pulse
When the dead discover a means to contact the living through electronic devices, cellphones and computers become open gateways to monstrosities and destruction.
2006-08-11 | en
7.1
WarGames
High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
1983-06-03 | en
6.5
Nirvana
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
1997-01-24 | it
5.1
The Net 2.0
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
2006-02-15 | en
6.4
Hackers
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
1995-09-14 | en
7.5
The Girl with the Dragon Tattoo
Swedish thriller based on Stieg Larsson's novel about a male journalist and a young female hacker. In the opening of the movie, Mikael Blomkvist, a middle-aged publisher for the magazine Millennium, loses a libel case brought by corrupt Swedish industrialist Hans-Erik Wennerström. Nevertheless, he is hired by Henrik Vanger in order to solve a cold case, the disappearance of Vanger's niece
2009-02-27 | sv
7.5
Ghost in the Shell: Stand Alone Complex - Solid State Society
The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
2007-09-01 | ja
6.9
Sneakers
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
1992-09-09 | en
6.8
23
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
1998-07-02 | de
3.1
Salaam Kashmier
Salaam Kashmir revolves around two men - Tomy Eeppan Devassy and Sreekumar. Jayaram plays Sreekumar, a character who does all the domestic work expected from a wife in normal course. Into this peaceful world enters Tomy (Suresh Gopi) disrupting the domestic bliss and bringing out an unexpected twist.
2014-02-13 | ml
6.8
eXistenZ
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
1999-04-14 | en
5.6
Sync
Every 15 seconds, a computer, network, or mobile device is hacked by cyber-terrorists. To combat this problem, Syntek Industries has manufactured data couriers designed from advanced machine robotics. These couriers are known as SYNCS. Syncs are programmed to securely deliver data packages without interruption.
2014-10-27 | en
6.6
Nicotina
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
2003-10-03 | es
8.2
The Matrix
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
1999-03-31 | en
5.5
Cube 2: Hypercube
Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
2002-04-15 | en
7.1
Pi
A mathematical genius discovers a link between numbers and reality, and thus believes he can predict the future.
1998-07-10 | en
6.6
Tron
When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
1982-07-09 | en