
In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
Íris
Tomás
Arya (voice)
Ministro de Defesa
Repórter 1
Repórter 2
Atendente

In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
2024-10-13
0
There is no peace without freedom.
5.6During a routine prison work detail, convict Piper is chained to Dodge, a cyberhacker, when gunfire breaks out. Apparently, the attack is related to stolen money that the Mafia is after, and some computer files that somebody wants desperately to bury. The pair, who don't exactly enjoy each other's company, escape and must work together if they are to reach Atlanta alive. Luckily, they meet a woman who may be willing to help them.
0.0On an isolated farm, a woman finds an injured and frightened woman in her old chicken coop. Moved by an inexplicable instinct, she decides to help her, without imagining that this silent encounter will awaken buried secrets. When tension finally gives way to trust, something dark approaches, bringing a truth that no one could have foreseen.
7.4The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
7.6Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
0.0Armed with only a collection of cell phones and a unique talent, a hacker orchestrates an elaborate bank heist from an abandoned building. But when things spin out of control, she has her wits to hold it all together.
7.1High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
7.6Astronaut Taylor crash lands on a distant planet ruled by apes who use a primitive race of humans for experimentation and sport. Soon Taylor finds himself among the hunted, his life in the hands of a benevolent chimpanzee scientist.
6.8A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
6.8Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.
6.3Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
6.0A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
5.8After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!
6.4Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
2.5In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
3.3After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
5.8State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
5.1The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.