Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
phishing attacks
Most popular
Phishing Attacks
software
Relevance
Popularity
Rating
Blood & Glory
free
782
Glu Games Inc.
THE HIT iOS GAME COMES TO THE MAC APP STORE! THERE WILL BE BLOOD…...
dual weapons SPECIAL
ATTACKS
& COMBOS Complete special
attacks
and combos
VeraCrypt
free
773
IDRIX
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt...
developments in brute-force
attacks
...much harder for an
attacker
to gain access
McAfee WebAdvisor
free
715
McAfee, Inc.
These days, without the proper anti-phishing protection, you are exposed to various risks while browsing...
the proper anti-
phishing
protection ...without worrying about
phishing
attacks
. The program
MacBooster
796
IObit
MacBooster is a utility designed to help you optimize the performance of your system...
MacBooster is a utility designed to help you optimize the performance of your system. The program
Norton 360
540
NortonLifeLock Inc.
Norton 360 delivers dynamic results for proper protection against computer viruses. The application...
files and system, anti-
phishing
monitoring, and system protection
Webroot SecureAnywhere
539
Webroot Inc.
This program brings you an advanced protection against viruses...
malicious websites and fishing
attacks
before they can
Blood & Glory 2: Legend
free
496
Glu Games Inc.
***If you are experiencing an initial loading screen hang and are currently on Mac OS Mountain Lion 10.8...
unleash stunning Special
Attacks
, Super Combos...unblockable and undodgeable
attacks
so choose
UNDERTALE
468
Tobyfox
UNDERTALE is a challenging RPG game application in which you control a human who falls underground...
need to time your
attacks
for extra damage...then dodge enemy
attacks
in a style reminiscent
ESET Cyber Security Pro
436
ESET
ESET Cyber Security Pro represents a new approach to truly integrated computer...
your computer against
attacks
and malicious...other Internet-borne
attacks
without hindering
Inky
free
385
Arcode® Corporation, Inc.
Inky is more than just an email client for your Mac. Besides helping...
also capable of preventing
phishing
attacks
and provides
ESET Cybersecurity
183
ESET, spol. s.r.o
ESET Cybersecurity is a dependable anti-virus solution for your Mac. No personal computer exists...
malware and other threats
attack
the Mac OS X platform
TitanAttacks
351
Puppygames
As the last surviving tank commander on Earth, single-handedly turn back the evil invading...
ll show 'em! Titan
Attacks
Pecunia
320
com.macemmi
Pecunia is a comprehensive online banking application for the Mac. It is open source (GPL)...
level security against standard
attacks
, offering a security
Detect Safe Browsing
free
309
com.easysol
Detect Safe Browsing (DSB) from Easy Solutions extends fraud prevention to the end...
such as, pharming,
phishing
, man-in-the-middle...the browser (MITB)
attacks
. DSB provides
Defense Zone 2
294
Artem Kotov
Defense Zone 2 is a strategy game developed for Mac where your objective...
fort from incoming enemy
attacks
. You can
DNSCrypt-Menubar
free
287
OpenDNS
DNS is one of the fundamental building blocks of the Internet. It's used any time you visit a website...
man-in-the-middle
attacks
. It doesn't require
Transcend Elite
free
266
Transcend Information, Inc.
Transcend Elite can help you protect important and sensitive data from accidental losses...
power failures or virus
attacks
. The tool is specifically
Syncovery
229
Super Flexible Software
Syncovery can help you synchronize and back up your data to prevent losses due to virus attacks...
losses due to virus
attacks
, hardware crashes, etc
EncryptIt
free
227
Jannes Klaas
EncryptIt is a system security tool that lets you encrypt your files. It utilizes the AES...
words, because word dictionary
attacks
don't work against
Deep Predator
free
225
Mobilcent ltd.
Deep Predator is a simple arcade game for Mac that takes...
due to enemy planes
attacks
. The game brings
1
2
3
4
5
6
7
8
…
16
Tags
Avoid Mines
Create Backup
Defense
Email Syncing
Encrypted Backup
Enemy Ships
Find Email
Protect
Safety
Tool
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.