- DETECTS, ISOLATES & REMOVES SPYWARE
- Detects over 10000 blacklisted tracking cookies
- Internet Clutter Cleanup
- Free Definition Updates
- No Subscription Fees
MacScan NewsShoring up your Mac’s Security in Yosemite
MacScan 2.9.4 Security & Privacy Adds Mac OS X 10.8 Mountain Lion Support
SecureMac releases MacScan 2.9.3
MacScan 2.9.2 Released Protecting Mac OS X from Malware and Privacy Threats
- Loading ...
MacScan offers Privacy & Security for Mac OS X
MacScan offers protection against malware and privacy threats such as trojan horses, keystroke loggers, dialer applications and spyware. MacScan also detects commercially available software that may allow for remote access to the computer or violate privacy and security.
To learn more about the types of software detected click below.
Below is a list of spyware, keystroke loggers, dialer applications, remote administrative applications, trojan horses and other malware MacScan identifies and protects against.
MacScan Detection List
Mac Spyware Definitions
Spyware - Spyware is a generic term for any program that takes your personal information and stores it on your computer or sends it out to the internet for retrieval by a third party. There are a few different types of individual spyware programs, including keyloggers, trojan horses, dialer applications, remote administration programs, as well as tracking cookies. Spyware can exhibit a combination of traits found in trojan horses, keyloggers, and remote administration programs, and these programs are considered hybrid spyware.
Keystroke Loggers - MacScan detects against keystroke loggers, also known as keyloggers, keystroke recorders, key nabbers, key loggers or key capture programs. When a keystroke logger is installed, keystrokes are recorded — capturing data such as usernames, passwords, credit card numbers, social security numbers, personal data and other information typed. The data may be logged to a file for later retrieval or transfered over the Internet.
MacScan detects both commercially available keystroke recorders as well as keyloggers released by hackers. Although many of the commercially available keystroke recorders are marketed to parents as a way to monitor their children on the internet, many of these programs can be used in the same manner to spy on others without consent. Scenarios may include shared use computers (school, office, cyber cafes) and corporate espionage.
Trojan Horses - Trojan Horses are malicious programs that are disguised as innocent files, usually run invisibly on your system, and enable a remote attacker to transfer files to and from your computer, delete your files, and view your sensitive information. The DNSChanger trojan horse, which recently attacked OS X, can intercept the websites you are attempting to visit, and redirect you to malicious websites which will steal your login information.