Zero Days

Tagline : World War 3.0

Runtime : 116 mins

Genre : Documentary

Vote Rating : 7.3/10

Revenue : 109.6 thousand $ USD


Reviews for this movie are available below.

Plot : Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.

Cast Members

Disclaimer - This is a news site. All the information listed here is to be found on the web elsewhere. We do not host, upload or link to any video, films, media file, live streams etc. Kodiapps is not responsible for the accuracy, compliance, copyright, legality, decency, or any other aspect of the content streamed to/from your device. We are not connected to or in any other way affiliated with Kodi, Team Kodi, or the XBMC Foundation. We provide no support for third party add-ons installed on your devices, as they do not belong to us. It is your responsibility to ensure that you comply with all your regional legalities and personal access rights regarding any streams to be found on the web. If in doubt, do not use.
DMCA Policy
- Privacy Policy
Kodiapps app v7.0 - Available for Android. You can now add latest scene releases to your collection with Add to Trakt. More features and updates coming to this app real soon.
Tip : Add https://kodiapps.com/rss to your RSS Ticker in System/Appearance/Skin settings to get the very latest Movie & TV Show release info delivered direct to your Kodi Home Screen. Builders are free to use it for their builds too.
You can get all the very release news and updates direct from our Telegram group.
Our Twitter and Facebook pages are no longer supported.

Reviews

Stuxnet was malware that flashed around the world via Microsoft computers, triggering arbitrary BSODs and random reboots. In 2010 cybersecurity firms captured and began analyzing the worm. Stuxnet (name derived from merging two random lines in the code) had digital certificates. Digital certificates require biometrics (human identification) and pass codes. But Stuxnet could attain access without that. It ominously coded multiple zero days exploit. Symantec's investigators see maybe one a year, looking at thousands of lines of code. Stuxnet had four. As we learn in the documentary, it also had undoubtedly stolen product identity codes for PLCs (programmable logic controls) from Siemens. Where were these PLCs? Installed on centrifuges at Natanz, an Iranian nuclear site. And the game's afoot. Whose program? To what purpose? Gibney does an excellent job of gearing us up for the technowizardry with hunter/seekers Eric Chien and Liam O'Munchu (Symantec) as geek guides to the nation-state business of cyber espionage and, as General Michael Hayden, former CIA and NSA director calls it, the "hideously classified" world of cyber weaponry. We meet the journalists, bench players and sideline government officialdom who were not a part of, or even aware of, Stuxnet. The documentary is a mild, entertaining but serious call to start a dialogue about cyber weapons and deployment of same. How do countries begin to arbitrate treaties regarding use of life-threatening coding? Filmed well, the effects shrouding the unnamed informant are great viewing. The on-camera personnel are well-chosen, entertaining and as informative as they're able to be. There are enough tech buzzwords to keep nontechs like me interested, and enough about how dangerous coding with a mission to DISRUPT DEGRADE DESTROY can be for those of us who count on critical infrastructure systems.

Similar Movies

HAK_MTL

Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.

Caught in the Net

Everyone knows something like this is happening. But this is the only experiment to fully demonstrate what excessive openness on the internet means. The filmmaking couple hired youthful-looking (but over 18) actresses to pretend to be prepubescent girls and communicate with strangers who approached them based on their fake accounts. They attracted dozens of men in the first ten days, then hundreds, and finally thousands...

Cyberworld - The future is now

Documentary and reflection about the effects of technology.

Hacking Democracy

Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.

Russias Cyber Army

For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?

In the Realm of the Hackers

In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.

The Choice - The Risks of Web Democracy

Italy’s biggest political party, the Five Star Movement, promotes direct democracy through internet voting. Five Star Movement uses a digital platform named Rousseau, that allows Movement’s members to vote online and express their opinion on various issues. But who governs this data?

Cyber Crime: The Dark Web Uncovered

11 of the world's top cyber security experts gather to explore and answer questions about the dark web. What is the dark web? What can you find there? And most important of all, how can business owners take the proper steps to reduce their chances of becoming victims of cybercrime?

Hackers - Identity Theft

Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to hold it to ransom for their personal data. Companies, public bodies, schools and individuals have all become victims of cyber attacks. In this revealing documentary, victims tell how internet criminals have destroyed their lives

TPB AFK: The Pirate Bay - Away from Keyboard

TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.

Do We Belong Here: The Triumphs and Struggles of Cybersecuritys Women

Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.