Keith Martin from Macworld summed it up pretty well, saying that now MacKeeper “. Even those who were sceptical about the app years ago have admitted that it has gone through a tremendous journey of transformation. The latest version of MacKeeper has also been critically acclaimed by top media reviewers. If you have ever used Trustpilot to make a choice, you know these are 100% genuine reviews from real app users-the service is explicitly transparent and very honest about who leaves feedback. However, if you take a closer look at trusted review sources, like ShopperApproved or Trustpilot, you’ll hear the real user stories-both platforms are well known for strictly fighting fake reviews.Īs of now, MacKeeper is rated Excellent on Trustpilot, with an overall score of 4.6 out of 5. When you research what users are saying about MacKeeper, you may come across multiple forum discussions. You can read more about our transformation here. Since then, MacKeeper has experienced a complete makeover, including an all-new privacy feature set, in-depth code optimization, honest communication, and, well, trying our best to win back the hearts of our users and the industry. In 2019, Clario Tech acquired MacKeeper’s developer, Kromtech, with the all-new transformative vision of the app. That’s why we’ve meticulously revisited our partnerships, and started moving towards complete transparency. Many ads sounded way too intimidating, which is the complete opposite of how we wanted to market our product. At one point, we were struggling with our affiliate partners going off the rails in advertising. The question is, can they all be trusted? The current MacKeeper is notarized by Apple, certified by AppEsteem, and has passed the AV-TEST comparison with a sealed 99.7% virus detection rate. So, if you haven’t yet crossed the bridge and become a Mac anti-virus user, now would be a good time to give it a go.You may find polarized opinions about MacKeeper on the web. Of course, if you don’t have MacKeeper, that alone doesn’t make you immune from infection by OSX/Agent-ANTU, or any other Mac malware, for that matter.Īlso, don’t assume that Mac malware always needs an administrator prompt before it can do anything harmful.Ĭonsider ransomware, for example: that sort of malware generally leaves your system files and applications well alone, even if it does have administrator access, so that you can still get online easily to pay the unscrambling fee.īut ransomware, while it’s running under your account, can nevertheless scramble all your data files – the ones that really matter! If you have MacKeeper, and intend to keep on using it, make sure it’s up-to-date. Ironically, the downloader used a fake malware report to justify any MacKeeper popup that might ask you for your administrative password, thus giving the malware system-wide powers.Īs in the OSX/LaoShu case mentioned above, the malware included not only a downloader component to let the crooks install what they wanted, but also an upload function handy for stealing files. The crooks sent unpatched MacKeeper users to a web page that tricked their Macs into downloading the OSX/Agent-ANTU malware. Unfortunately, according to BAE, some crooks struck while the iron was hot. MacKeeper quickly patched the hole after it became known, but until you received the update you were at risk of a Remote Code Execution (RCE) hole.Īs long as you were unpatched, a crook could simply entice or redirect you to a poisoned website, and use a single line of JavaScript to send a command script to MacKeeper, which would then run it. The crooks used a security hole in a controversial Mac security and cleanup utility called MacKeeper. Researchers at BAE just reported on a Mac bot known as OSX/Agent-ANTU that was allegedly distributed in a novel way. Amongst other things, this one would find files such as documents, spreadsheets, presentations and archives…and send them to the crooks. If you opened the bogus PDF file, really an application in disguise, you could end up infected with a data-stealing Trojan called OSX/LaoShu-A. 2014: Fake “undelivered item” documents.If you opened a booby-trapped document, disguised as some sort of political commentary, the crooks got control of your Mac via zombie malware called OSX/Agent-AADL. SophosLabs reported on attackers using an exploitable bug in Microsoft Word for Mac to target Chinese minority groups. Estimates suggest that more than 600,000 Macs ended up infected, supposedly including “ 274 from Cupertino.” Flashback was a bot, or zombie, meaning that crooks could remotely send it instructions to help them commit further cybercrime. The Flashback malware was injected onto your Mac via an unpatched Java bug.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |