
The Cicada Code(2024)
There is no peace without freedom.
In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
Movie: The Cicada Code
Top 10 Billed Cast
Íris
Tomás
Arya (voice)
Ministro de Defesa
Repórter 1
Repórter 2
Atendente

O Código Cicada
HomePage
Overview
In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
Release Date
2024-10-13
Average
0
Rating:
0.0 startsTagline
There is no peace without freedom.
Genres
Languages:
PortuguêsKeywords
Similar Movies
7.8Absolut(en)
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
8.2The Matrix(en)
Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
6.8eXistenZ(en)
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
5.5Cube 2: Hypercube(en)
Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
6.7Tron(en)
When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
5.8Firewall(en)
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
5.1The Net 2.0(en)
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
6.8The Italian Job(en)
Charlie Croker pulled off the crime of a lifetime. The one thing that he didn't plan on was being double-crossed. Along with a drop-dead gorgeous safecracker, Croker and his team take off to re-steal the loot and end up in a pulse-pounding, pedal-to-the-metal chase that careens up, down, above and below the streets of Los Angeles.
6.2Swordfish(en)
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
6.6Nicotina(es)
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
3.3Lawnmower Man 2: Beyond Cyberspace(en)
After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
6.4Hackers(en)
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
6.1Takedown(en)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
6.0Antitrust(en)
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
5.8Stay Alive(en)
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!
10.0Ambient Trip Commander(en)
AMBIENT TRIP COMMANDER is the story of Samantha Tapferstern, a geeky young woman who lives a rather dull life in a medium-sized European city. She works a mundane job at a synthesizer store and spends her lonely evenings playing RPG games. One day she receives a cryptic email from a hacker group inviting her to Lonetal, a village secluded somewhere deep in the European Alps. As we follow her journey to Lonetal, things become more sinister and a grand mystery starts to unfold…
7.6Who Am I(de)
Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
6.823(de)
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.




