
In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
Íris
Tomás
Arya (voice)
Ministro de Defesa
Repórter 1
Repórter 2
Atendente

In a Brazil taken over by a new dictatorial regime, Íris, a young hacker whose father was taken as a political prisoner, discovers an online challenge from a secret organization known only as 'Cicada,' which will set her on a journey that could change the course of the country... and also uncover what really happened to her father.
2024-10-13
0
There is no peace without freedom.
6.5Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
6.8A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
6.2How many servers would you hack for love? What started as a silly attempt to win back his girlfriend turns into a dangerous game of revenge for Vishnu, risking everything he cherishes.
7.8Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
5.5Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
8.2Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
6.8The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
6.2In a dystopian future, insurance fraud investigator William Gold arrives in Shanghai to investigate a forgery ring for "papelles", futuristic passports that record people's identities and genetics. Gold falls for Maria Gonzalez, the woman in charge of the forgeries. After a passionate affair, Gold returns home, having named a coworker as the culprit. But when one of Gonzalez's customers is found dead, Gold is sent back to Shanghai to complete the investigation.
6.6When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world...And becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
7.1High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
7.6Astronaut Taylor crash lands on a distant planet ruled by apes who use a primitive race of humans for experimentation and sport. Soon Taylor finds himself among the hunted, his life in the hands of a benevolent chimpanzee scientist.
6.9A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
5.6During a routine prison work detail, convict Piper is chained to Dodge, a cyberhacker, when gunfire breaks out. Apparently, the attack is related to stolen money that the Mafia is after, and some computer files that somebody wants desperately to bury. The pair, who don't exactly enjoy each other's company, escape and must work together if they are to reach Atlanta alive. Luckily, they meet a woman who may be willing to help them.
7.4The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
7.0Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.
2.5In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
7.6Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
4.2Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.
3.8The USA is attacked by a large group of well organized terrorists who communicate through a computer network via satellite. A bunch of highschool kids has hacked the password and gained access. Believing it's a game they unknowingly cause terror acts all over the country. An anti-terror force fights against the terrorists.