logologo
MovieVerse© 2024
Privacy PolicyTerms of ServiceContact Us
Made with ❤️ by Thathsara
movie poster
The Cache
Sign in to create your own watchlist

The Cache

Apr 19, 2017
1h 30m
★ 5.5

Overview

Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?

Genres

Thriller

Production Companies

Dutch Mountain Film

The Cache Trailers

No Trailers found.

Cast

Stefanie van Leersum

Stefanie van Leersum

Nasrdin Dchar

Nasrdin Dchar

Thomas Höppener

Thomas Höppener

Roos Ouwehand

Roos Ouwehand

Alex Hendrickx

Alex Hendrickx

Jonathan Huisman

Jonathan Huisman

Tom van Kalmthout

Tom van Kalmthout

Bert Hana

Bert Hana

You may also like

Cube 2: Hypercube
5.5

Cube 2: Hypercube

Apr 15, 2002

Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.

Inside Man
7.4

Inside Man

Mar 17, 2006

When an armed, masked gang enter a Manhattan bank, lock the doors and take hostages, the detective assigned to effect their release enters negotiations preoccupied with corruption charges he is facing.

Breakdown
6.9

Breakdown

May 2, 1997

On their cross-country drive, a married couple, Jeff and Amy Taylor, experience car trouble after their SUV breaks down. Stranded in the New Mexico desert, the two catch a break when a passing truck driver offers Amy a ride to a nearby café to call for help. Meanwhile, Jeff is able to fix the car and make his way to the café, but Amy isn't there. He tracks down the trucker -- who tells the police he's never seen Jeff or his wife before. Jeff then begins a desperate, frenzied search for Amy.

Nirvana
6.5

Nirvana

Jan 24, 1997

Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.

23
6.8

23

Jul 2, 1998

The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.

Getaway Plan
5.6

Getaway Plan

Apr 28, 2017

A thief expert with blowtorch is hired by a group of the Russian mob for a bank assault.

Breaking
6.5

Breaking

Aug 25, 2022

Desperate for money and running out of options, Marine veteran Brian Brown-Easley holds several people hostage inside a bank, setting the stage for a tense confrontation with police.

No Good Deed
5.3

No Good Deed

Jun 28, 2002

While doing a friend a favour and searching for a runaway teenager, a police detective stumbles upon a bizarre band of criminals about to pull off a bank robbery. The screenplay by Christopher Cannan and Steve Barancik is based on the short story "The House in Turk Street" by Dashiell Hammett.

Night Hunter
6.6

Night Hunter

Aug 8, 2019

A Minnesota police officer crosses paths with a committed and tireless vigilante as he follows the trail of a ruthless predator responsible for several abductions and murders.

WarGames
7.1

WarGames

Jun 3, 1983

High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.

Stay Alive
5.8

Stay Alive

Mar 24, 2006

After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!

Escape Plan 2: Hades
5.2

Escape Plan 2: Hades

Jun 5, 2018

Ray Breslin manages an elite team of security specialists trained in the art of breaking people out of the world's most impenetrable prisons. When his most trusted operative, Shu Ren, is kidnapped and disappears inside the most elaborate prison ever built, Ray must track him down with the help of some of his former friends.

Dog Day Afternoon
7.8

Dog Day Afternoon

Sep 21, 1975

Based on the true story of would-be Brooklyn bank robbers John Wojtowicz and Salvatore Naturile. Sonny and Sal attempt a bank heist which quickly turns sour and escalates into a hostage situation and stand-off with the police. As Sonny's motives for the robbery are slowly revealed and things become more complicated, the heist turns into a media circus.

Give Us Tomorrow
3.5

Give Us Tomorrow

Nov 30, 1978

Masked intruders take the family of a bank manager hostage in order to rob his bank.

Armored
5.7

Armored

Dec 4, 2009

A crew of officers at an armored transport security firm risk their lives when they embark on the ultimate heist against their own company. Armed with a seemingly fool-proof plan, the men plan on making off with a fortune with harm to none. But when an unexpected witness interferes, the plan quickly unravels and all bets are off.

Lawnmower Man 2: Beyond Cyberspace
3.3

Lawnmower Man 2: Beyond Cyberspace

Jan 12, 1996

Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.

The Girl in the Spider's Web
6.1

The Girl in the Spider's Web

Oct 25, 2018

After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.

Who Am I
7.6

Who Am I

Sep 25, 2014

Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.

Takers
6.2

Takers

Aug 26, 2010

A seasoned team of bank robbers, including Gordon Jennings, John Rahway, A.J., and brothers Jake and Jesse Attica successfully complete their latest heist and lead a life of luxury while planning their next job. When Ghost, a former member of their team, is released from prison he convinces the group to strike an armored car carrying $20 million. As the "Takers" carefully plot out their strategy and draw nearer to exacting the grand heist, a reckless police officer inches closer to apprehending the criminals.

The Girl Who Played with Fire
7.0

The Girl Who Played with Fire

Sep 18, 2009

Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.