Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
terror attacks
Featured
Terror Attacks
Software
Relevance
Popularity
Rating
Seagate File Recovery
1,141
Seagate Technology LLC
Seagate File Recovery software restores files from hard drive or removable storage...
corrupted due to virus
attacks
. Featuring Intelligent Scan Technology
Blood & Glory
free
782
Glu Games Inc.
THE HIT iOS GAME COMES TO THE MAC APP STORE! THERE WILL BE BLOOD…...
dual weapons SPECIAL
ATTACKS
& COMBOS Complete special
attacks
and combos
VeraCrypt
free
772
IDRIX
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt...
developments in brute-force
attacks
...much harder for an
attacker
to gain access
Webroot SecureAnywhere
539
Webroot Inc.
This program brings you an advanced protection against viruses...
malicious websites and fishing
attacks
before they can
Blood & Glory 2: Legend
free
496
Glu Games Inc.
***If you are experiencing an initial loading screen hang and are currently on Mac OS Mountain Lion 10.8...
unleash stunning Special
Attacks
, Super Combos...unblockable and undodgeable
attacks
so choose
Detect Safe Browsing
free
309
com.easysol
Detect Safe Browsing (DSB) from Easy Solutions extends fraud prevention to the end...
in-the browser (MITB)
attacks
. DSB provides
Transcend Elite
free
266
Transcend Information, Inc.
Transcend Elite can help you protect important and sensitive data from accidental losses...
power failures or virus
attacks
. The tool is specifically
Syncovery
229
Super Flexible Software
Syncovery can help you synchronize and back up your data to prevent losses due to virus attacks...
losses due to virus
attacks
, hardware crashes, etc
Pocket Dogfights
free
180
Zerobytes
Pocket Dogfights is an arcade game for Mac that provides you with an 80's gaming feel due to its graphics...
Pocket Dogfights is an arcade game for Mac that provides you with an 80's gaming
McAfee Endpoint Protection for Mac
178
McAfee, Inc.
This application is an essential security solution for protecting the data on your Mac endpoints...
of viruses, spyware, phishing
attacks
, and exploits. The program
Sentinel 3: Homeworld
77
Origin8
Sentinel 3: Homeworld - the third instalment of the highly acclaimed Sentinel sci-fi tower defense series...
armor to execute devastating
attacks
and support
eVPN
76
️Evpn
eVPN provides fast access to websites and apps...
are protected from hacker
attacks
Obscurium
69
Sugar Bytes
Obscurium is a generative synthesizer and timbral organism. Feeding on scales...
arpeggios and deadly percussion
attacks
iBomber Defense Pacific
62
Chillingo Ltd
iBomber Defense... The world of iBomber has got bigger and better...
withstand repeated enemy
attacks
and strategically plan...Rewind, Counter
Attacks
, Turret Damage
ESET Endpoint Antivirus
62
ESET, spol. s r.o.
ESET Endpoint Antivirus promises to protect your computers from malware attacks and other threats...
your computers from malware
attacks
and other threats, such
MacShiny
55
MacShiny
MacShiny is a professional tool for regular Mac cleanup...
a solid protection against malware
attacks
Super Bunny Man
47
Catobyte Ltd.
Super Bunny Man is a physics-based co-op platformer about a guy...
You beat levels, time
attacks
, find hidden carrots
Security Growler
free
47
Nick Sweeting
Security Growler is intended to keep your computer...
actions and avoid hacking
attacks
. The application is quite
Adware Cleaner
free
31
HALFBIT ltd.
Adware Cleaner is an application that helps...
degrades system performance or
attacks
your system
PostFinance SecureBrowser
free
28
PostFinance Ltd
The PostFinance SecureBrowser effectively protects you against bank Trojan horses, phishing attacks...
bank Trojan horses, phishing
attacks
and data theft
1
…
5
6
7
8
9
…
17
Tags
Find Malware
FTP Events
Monitor Port
Protect MAC
Remove Adware
Remove Malware
Secure Data
Security Alert
SSH Alerts
VNC Events
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.