Home Products
Protecting Mac users since 1997
Business Products
Cloud-based security and monitoring for business
Mac Security Blog

The chain of trust in Apple's devices
A lot of computer security is based on trust. Your devices verify that you are, indeed, an authorized user, through...
Continue Reading→
Researchers use lasers to hack Siri, Alexa, Google assistants
Researchers have used programmable low-powered lasers to remotely control voice-activated personal assistants like...
Continue Reading→