Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
phishing attacks
Featured
Phishing Attacks
Software
Relevance
Popularity
Rating
Magican
free
5,297
Magican Software Ltd.
There can be numerous reasons why your Mac isn't working at its full potential...
hard drive, malware
attacks
, outdated programs...your Mac from Trojan
attacks
, search for program
Mac Internet Security
3,213
Intego
Mac Internet Security contains two award winning security products that protect...
against malware and network
attacks
: VirusBarrier X9
Norton Internet Security
1,844
Symantec Corporation
Norton Internet Security lets you confidently browse, shop, bank, and socialize online without worrying about getting attacked...
worrying about getting
attacked
or scammed...Blocks fraudulent
phishing
websites created
Contract Killer 2
2
Glu Games Inc.
ESET Cyber Security Pro
434
ESET
ESET Cyber Security Pro represents a new approach to truly integrated computer...
your computer against
attacks
and malicious...other Internet-borne
attacks
without hindering
ESET Cybersecurity
183
ESET, spol. s.r.o
ESET Cybersecurity is a dependable anti-virus solution for your Mac. No personal computer exists...
malware and other threats
attack
the Mac OS X platform
TitanAttacks
351
Puppygames
As the last surviving tank commander on Earth, single-handedly turn back the evil invading...
ll show 'em! Titan
Attacks
Defense Zone 2
293
Artem Kotov
Defense Zone 2 is a strategy game developed for Mac where your objective...
fort from incoming enemy
attacks
. You can
TotalAv Safe Site
free
58
Protect Ltd
TotalAv Safe Site blocks harmful and malicious URLs. You will benefit from free domain categorization...
against malware, deceptive and
phishing
websites
Yopmail
free
6
yopmail
YOPmail’s free, quick and feature rich service guards you against spam, phishing and other online abuses...
guards you against spam,
phishing
Learn - Mac Security Edition
4
SwansonDigital, LLC
Learn - Mac Security Edition is a HD video tutorial that helps you keep...
creating strong passwords, recognizing
phishing
e-mails, methods of encrypting
Thunderbird
free
19,088
Mozilla
As of July 2012, Thunderbird has transitioned to a new governance model, with new features being...
As of July 2012, Thunderbird has transitioned to a new governance model, with new features being
F-Secure Safe 2015
4
F-Secure
F-Secure Internet Security 2015 is a fast and easy-to-use software that keeps viruses...
blocking of spam and
phishing
e-mails
Admiral Nemo
free
2
Oleksandr Bouland
Admiral Nemo is an arcade-style shooting gallery settled in a steampunk world. Featuring great fantasy graphics...
been under constant
attack
...nickname. Often he
attacks
civilian population, deprives
Mystery Trackers: The Four Aces
1
Elephant Games
The entire town of Brightfield was evacuated after a series of bizarre...
a series of bizarre animal
attacks
. Now, strange creatures
BattleSouls
free
1
Pixeleap
BattleSouls is an online multiplayer action game about destroying your opponent’s...
focused on melee
attacks
to Wizards focused...on ranged
attacks
, each
Verx
free
Connect Code
At Connect Code it is not our mission to provide any web browser...
pop-ups or inappropriate
phishing
links. With Verx
Norman Antivirus
Norman
Macs don't live in a vacuum. Like all Internet connected computers...
computers, they get
attacked
by malware...Protection Our anti-
phishing
solution scans
WWII: Recon
free
Santa's Head
Provides Myth II players with an exciting variant on gameplay and demonstrates the power of the editing...
and has two basic
attacks
: firing...execute a wide variety of
attacks
. In addition
RLPassWeb
free
Theta Pi Software
RLPassWeb is a program that generates Natural Language passwords...
secure against dictionary
attacks
, the most common...brute-force password
attacks
. This program
1
2
3
4
5
6
7
8
…
16
Tags
Automatic Protection
Defense
Eliminate Threats
Find Duplicates
Internet
Internet Security
Mac
Multiplayer Game
Strong Passwords
System
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.
Apple’s got a patent for ultra-accurate tracking system
Apple knows how to innovate and disrupt, with iPhone being probably the best manifestation of this ability. Now it aims at gesture-based control.