Featured 

Compromised

Software
Telegram
free rating
43,677
Telegram
Telegram is a desktop messenger that uses the services with the same name...
or their security is compromised
Sketch
rating
3,707
The most important part of any drawing application is arguably the drawing area...
doesn't mean we've compromised on the tools though
ProtonVPN
rating
3,644
ch.protonvpn
ProtonVPN is a client application that allows you to browse the web using a VPN...
of the keys gets compromised. Moreover, ProtonVPN uses such
Touch VPN
free rating
303
TouchVPN Inc
Touch VPN is a one-click VPN proxy service. The application...
information can be easily compromised. Touch VPN encrypts
CloudPull
rating
179
Golden Hill Software
CloudPull is a simple Mac utility that was designed by the Golden...
your Gmail account gets compromised. The application comes
Uplink
rating
135
Introversion software
An enigma in itself, Uplink is akin to a more cerebral incarnation of Ambrosia's popular Escape Velocity series of games...
computer systems you've compromised to aid you
MetaClean
rating
72
Adarsus.com
Most files contain metadata as a way to make finding and working with them easier...
your privacy may be compromised. MetaClean allows viewing, editing
OPSWAT GEARS
free rating
32
OPSWAT, Inc.
The free OPSWAT GEARS tool allows home users and IT professionals...
on whether a device is compromised. The application, powered
Reincarnations - Uncover the Past 2
rating
24
Big Fish Games
Jane and Dr. Herzle have made a major breakthrough in reincarnation studies, but their hard work is compromised...
their hard work is compromised when Jane is kidnapped
sharedSecrets
free rating
14
ELKOSOFT Software GmbH
This application is good for keeping all your password...
your password is compromised, your life is compromised
Spoofer
free rating
11
Robert Beverly
Spoofer project measures the Internet's susceptibility to spoofed source address IP packets...
attacks and security circumvention. Compromised hosts on networks
PrivacyApp
free rating
7
Privoro LLC.
Privacy App is designed exclusively for iPhone 6/6s use with the Privoro privacy guards...
case have not been compromised. The app implements
Lockngo
rating
5
Keynesis Lockngo
Lockngo is a security application for USB, SATA, FireWire and other external...
your data can't be compromised
Reincarnations: Uncover the Past Collector's Edition
rating
2
Big Fish Games
Jane and Dr. Herzle have made a major breakthrough in reincarnation studies, but their hard work is compromised when Jane...
their hard work is compromised when Jane is kidnapped
Stop Robots
rating
1
Sergey Vitukhin
On Rusty Head planet, the robots became compromised by the virus "Dummy Algorythm"...
planet, the robots became compromised by the virus "Dummy
trafficlight
free rating
1
BitDefender
This extension will add a strong layer of security over your browsing experience...
of legitimate but recently compromised
iCanary (Classic)
rating Secret Weapon Labs
FileMaker offers many external methods of opening and accessing stored data. Given the many workarounds...
can your data be compromised?
Intego Mac Internet Security X8
rating Intego
Intego Mac Internet Security X8 contains two of our best-selling products that protect...
corrupted, stolen, or otherwise compromised
PC-Mac SecureJournal
rating Lava Software
PC-Mac SecureJournal contains a highly-secure document editor and password...
the user's computer is compromised, information stored by PC