Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
phishing attacks
Top
Phishing Attacks
downloads
Relevance
Popularity
Rating
Camino
free
2,620
The Camino Project
Camino is an user-friendly browser that will make your Internet experience a pleasant one. The app is a simple...
that includes built-in
phishing
and malware scripts
KisMAC
free
5,655
KisMAC
KisMAC allows users to detect and monitor wireless connections. The application uses AirPort...
be able to simulate
attacks
...the three types of
attacks
: wordlist, weak scheduling
Command and Conquer - Red Alert 3
57
Electronic Arts Inc.
Command and Conquer: Red Alert 3 brings back the fan...
designed solely around coordinating
attacks
and developing strategies
Prince of Persia
98
Ubisoft
The critically acclaimed Prince of Persia franchise returns for the first time on next...
or devastating fighting combo
attacks
Citrio
free
84
Citrio
Citrio is a Chromium-based Internet browser and, as such, it has many advantages. In this regard, it allows surfing...
against common malware and
phishing
. Besides
Thunder Fleets
4
Orator Games
Build and command your naval forces and engage in massive sea battles in this World War II real time strategy game...
have to plan your
attacks
carefully, picking regions
Torch Browser
free
4
Torch-Media
Torch Browser combines the awesomeness of powerful browsing with media downloading...
secure from viruses, malware,
phishing
and malicious websites
Magican
free
5,298
Magican Software Ltd.
There can be numerous reasons why your Mac isn't working at its full potential...
hard drive, malware
attacks
, outdated programs...your Mac from Trojan
attacks
, search for program
Microsoft 365
100,005
Microsoft
Start quickly with the most recent versions of Word, Excel...
Start quickly with the most recent versions of Word, Excel, PowerPoint, Outlook
Baby Ninja
15
Michael Sandt
+++++++++++ BEST CHART RANKINGS OF BABY NINJA ++++++++++++ #14 in Kids Games (iPhone...
3D Baby Ninja movement
attacks
!" Play the game
World Conqueror 1945
21
EASY Inc.
World Conqueror 1945 is a new style strategy game on the background of WWⅡ...
general
attack
, tank troop with high
attack
...troop for enhancing the
attacking
power)
Maxthon
free
3,645
Maxthon International Ltd.
Maxthon is a Safari-based web browser. Actually, it uses two engines. In this respect...
unable to detect some
phishing
sites and malware
G DATA AntiVirus
12
G DATA Software
G DATA AntiVirus for Mac offers special protection against viruses and phishing attempts for your Mac running OS X...
against viruses and
phishing
attempts...your network. Integrated
phishing
protection also blocks
iAntiVirus
3,961
PC Tools
With PC Tools iAntiVirus™ you are protected against the most nefarious cyber...
use it to launch
attacks
against other computers
Sophos Home
1,153
Sophos Plc
Sophos Home protects every Mac and PC in your home from malicious software...
Sophos Home protects every Mac and PC in your home from malicious software, inappropriate
Yandex
free
6,178
Yandex
Yandex is a quick and secure browser for computers, as well as smartphones...
spoofing or cache poisoning
attacks
Unleash the Light
free
11
Cartoon Network
Unleash the Light lets you team up for amazing combo attacks and Gem fusions. You can choose which Gems...
up for amazing combo
attacks
and Gem fusions
ESET Endpoint Antivirus
63
ESET, spol. s r.o.
ESET Endpoint Antivirus promises to protect your computers from malware attacks and other threats...
from malware
attacks
and other threats, such as
phishing
l1neum
free
4
la1n
Your spaceship sits on the wall enclosing the battlefield. Use the arrow keys...
you are susceptive to
attacks
by the enemy
Chromium
free
9,255
The Chromium Authors
Chromium is a web browser, but is also part of a larger open-source project that provides...
mistyped addresses and prevent
phishing
. However, unfortunately, Chromium
1
2
3
4
5
6
7
8
…
16
Tags
Anti-phishing Protection
Antimalware Protection
Command
Game
Malware
NET Stumbling
Software Management
Strategy
Virus Check
Web Browser
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.