Life hack

How to protect your mac from malware

В macOS есть множество функций, помогающих защитить Ваш Mac и Ваши личные данные от вредоносных программ, или malware. Одним из способов распространения вредоносного ПО является его встраивание в безобидно выглядящие приложения.

Этот риск можно уменьшить, если использовать ПО, полученное только из надежных источников. Настройки «Защита и безопасность» позволяют Вам указать источники ПО, установленного на Вашем Mac.

На Mac выберите меню Apple

> «Системные настройки», нажмите «Защита и безопасность», затем нажмите «Основные».

Если слева внизу отображается запертый замок , нажмите его, чтобы разблокировать панель настроек.

Выберите источники, из которых Вы разрешаете устанавливать программное обеспечение:

App Store. Разрешить только приложения, загруженные из Mac App Store. Это наиболее безопасный параметр. Все разработчики приложений, представленных в Mac App Store, идентифицированы Apple, и каждое приложение проходит проверку, прежде чем попадает в магазин. macOS проверяет приложение перед первым запуском, чтобы убедиться, что приложение не было изменено после предоставления его разработчиком. При возникновении проблем с приложением Apple удаляет его из Mac App Store.

App Store и установленные разработчики. Разрешить приложения из Mac App Store и приложения установленных разработчиков. Установленные разработчики зарегистрированы в Apple и могут отправлять свои приложения в Apple для проверки безопасности. Если с приложением возникают проблемы, Apple может отозвать его авторизацию. macOS проверяет приложение перед первым запуском, чтобы убедиться, что приложение не было изменено после предоставления его разработчиком.

Помимо приложений, небезопасными могут быть также другие типы файлов. Скрипты, веб-архивы и архивы Java могут потенциально нанести вред системе. Конечно, не все такие файлы опасны, но при открытии любых загруженных файлов следует соблюдать осторожность. Когда Вы собираетесь впервые открыть такой файл, отображается предупреждение. Запуск приложения в обход настроек безопасности.

Updated Feb 25, 2019, 12:53 pm EST | 4 min read

How to protect your mac from malware

“Macs can’t get malware” is an obsolete idea. Macs aren’t safe from malware, and haven’t been for a long time.

This isn’t to say that macOS is an insecure operating system: it isn’t. But macOS is, like Windows and Linux, vulnerable to user error. On some level, ensuring your Mac is free from malware is up to you.

We’ve collected some tips for Mac users, but there are a lot of things you can do that aren’t specific to Macs, too—so be sure to check out our complete guide to basic security in addition to the following tips.

Keep Your Mac, and Other Software, Up to Date

You know how macOS will notify you of new updates, and you always click “Remind Me Later”? Yeah, you should stop doing that.

The most important, and easiest, way to keep your Mac safe from malware is to keep macOS and all of your apps up to date. System updates patch known security vulnerabilities, so if you’re not up to date you’re leaving now-documented openings there for malware to potentially exploit. System updates also update X-Protect, your Mac’s hidden anti-malware software, giving you system-level protection against common malware.

Updates for your applications are also essential. Your browser is a huge potential vector for infection, so make sure that is up to date. Vulnerabilities in any application is a potential problem.

How to protect your mac from malware

Happily, the Mac App Store makes managing updates pretty easy, by putting system updates and updates for a lot of your applications all in one place. And macOS is very good about notifying you about these updates, with banners that are impossible to miss and a number in the menu bar. You can even enable automatic updates in the background if you don’t want to deal with managing everything on your own.

As for applications that you didn’t get from the Mac App Store, that’s up to you. If you see a notification insisting that you install an update, do it. It’s annoying, sure, but it’s an important way to keep your Mac safe.

Only Install Software That You Trust

If you know where you look, you can find any Mac application for free. It’s called “piracy,” and I’m sure an upstanding citizen such as yourself has never heard of it.

Seriously, though: installing pirated Mac apps from sketchy sites is the most common way to end up with malware, followed closely by clicking ads suggesting something like “Your Adobe Flash software is out of date.” If you install software from untrustworthy sites, no anti-malware software can help you, and there’s no telling what kind of infection you might end up with.

So don’t do that. Always download software from the Mac App Store, or directly from the software’s official website. If you get a popup saying Adobe Flash is out of date, it’s probably a scam—but if you want to make sure, go to instead of clicking the popup and check for updates from the official source.

How to protect your mac from malware

By default, your Mac will only run software from authorized developers, which is good. This is a vital security layer for you. So even though we’ve shown you how to open apps from “Unidentified Developers” on your Mac, you should only actually do this if you’re completely certain that the application you’re giving permission to run is from a trustworthy source. I try to limit this to projects with publicly available source code, but you’ll need to work out rules for yourself. Just make sure you’re only running applications you know for a fact that you can trust.

Disable Java and Flash

Two of the most common vectors for Mac malware are Java and Flash, browser plugins that powered the early web but are increasingly becoming obsolete. It’s essential that you keep these plugins up-to-date.

On the modern web Java and Flash are both largely avoidable. Safari, the default web browser on macOS, disables both of them by default, running the plugins only when you specifically re-enable them.

How to protect your mac from malware

You can disable these plugins in other browsers as well, and it’s probably a good idea to disable Flash and Java in basically all circumstances. Enable them only on sites you trust, and only when necessary. The modern web doesn’t require Java or Flash that much anymore, so if you can avoid running them altogether that’s probably for the best.

Don’t Disable System Identity Protection

System Identity Protection, called SIP for short by some and “rootless” by others, makes it basically impossible for anything but a macOS update bundle to change core aspects of the operating system. Whereas previously a user could open the Terminal and change anything about the system with enough knowledge, most of the system is completely off limits now.

How to protect your mac from malware

This broke a lot of long-standing system tweaks, which is why some people look for ways to disable system identity protection. But disabling SIP is a very bad idea. If you have the ability to change the core of the operating system, so does any malware you run, which makes it harder to detect and remove such malware. For this reason, we recommend that you leave SIP alone.

Run Malware Scans

How to protect your mac from malware

We’ve shown you how to remove malware and adware from your Mac, and in that article we recommended Malwarebytes for Mac for the occasional malware scan. It’s a great program to have around when you suspect your Mac is infected, but even if you don’t have any suspicions it’s a good habit to run a scan from time to time. That way, if you are infected, you can at least find out quickly.

If you want an always-on malware scanner, we recommend Sophos, which is free for home users and has a very good reputation. It can be heavy on system resources, but is good if you want to catch potential infections in real time.

by Bill White 2 years ago

How to protect your mac from malware How to protect your Mac from malware

Not too long ago, we’ve shown you how to remove malware from Macs, but you might also be interested in knowing how to prevent malicious software from infecting your machine in the first place. After all, once the malware has gotten into your system, it already caused you a lot of headaches and done its harm. If you don’t want to go through all that, you’re going to need to actively protect yourself and take a series of precautions. Here’s how to do that:

Control the applications that you install

If you’re someone who doesn’t have a lot of experience in using Macs, you should be really careful with the programs that you install on the machine. Fortunately, MacOS makes it really easy to ensure that you only install applications from trusted locations:

Step 1

Click on the Apple menu button, then go to System Preferences –> System Preferences –> Security and Privacy –> General.

Step 2

In the Allow apps downloaded from the section, if you’re a beginner tick the App Store option to prevent the application from other sources from being installed. If you’re a somewhat more experienced user, you can use the App Store and identified developers option to get a bit more leeway while still staying safe.

How to protect your mac from malwareSecurity and Privacy options

Staying up-to-date

One thing you should be aware of is that both Apple, as well as software developers, fix security issues as they are discovered. This means that each update or patch that’s being released may contain fixes for vital vulnerabilities or other security flaws. This is why, it is highly recommended that you keep your operating system, drivers, as well as installed software, permanently updated. The more time you keep an older version installed, the more time you give attackers to exploit a known vulnerability.

Using a firewall

Firewalls are a very important part of your machine’s security as their job is to block unauthorized incoming and outgoing connections. By default, the MacOS operating system comes with its own firewall and you should ensure that it’s enabled by going to the Apple menu –> System Preferences –> Security & Privacy –> Firewall and clicking the Turn On Firewall button. Additionally, you can also install third-party tools such as Radio Silence or Noob Proof for extra security and options.

These are just a few basic yet important ways of protecting your Mac from malware. Of course, all the security options and tools in the world cannot replace the human brain, so make sure that you carefully read everything before installing an app, visiting a website or opening an email. Now that you know how to keep yourself safe from malware, the question is: what was the most annoying malicious software you’ve had to deal with? Let us know in the comments below.

In most cases, you can scan your Mac, detect malware, and delete it without professional help.

Chris Smith

  • April 27, 2020
  • How to protect your mac from malware

    In 2019, the number of attacks on Mac computers increased by 400%. To protect your device from viruses and malware, you should install an antivirus and an inbound firewall, uninstall the Flash Player and follow a few more simple rules. This article will help you keep your Mac protected 24/7 without paying too much or seeking professional help.

    Apple computers are safe and reliable devices. When compared to a Windows PC, Macs are less likely to get hacked or get infected by viruses. However, according to statistics from Malwarebytes, the number of threats to Mac computers has increased by 400% in 2019. The positive news is that by following a few simple steps you can protect your Mac against cyberattacks.

    How to protect your Mac from viruses and malware

    There are a few easy steps to enhance your protection. First, update all of your apps regularly. An outdated app becomes a security breach even if you don’t use it.

    To protect yourself from phishing attacks, start using a password manager. It will generate long and complicated passwords automatically every time you try to register on a new site and will store all passwords in its database.

    Instead of an inbound firewall, switch to a two-way one. Inbound firewalls are built in your device, but you shouldn’t think it’s a panacea for all sorts of attacks. Outbound firewalls are much more efficient against malware. For example, you might download some software that you didn’t think would be connecting to the Internet. In case it tries to connect, an outbound firewall will send you an alert.

    You should stop using the standalone Flash Player. Adobe Flash is constantly asking for updates, and one day this might be a phishing attack.

    How to protect your mac from malware

    It’s preferable to enable full disk encryption. This will provide an additional layer of protection to your files and folders. If your data isn’t 100% encrypted, a hacker may get hold of it.

    It’s advisable to switch off Spotlight Suggestions. These suggestions might leak your personal information to third parties unless you change their default settings. These “third parties” would be normally Apple and some search engines, but it’s better to play safe.

    When you need to share files, avoid peer-to-peer platforms. It’s extremely easy to download malware from such a platform, and then it will expose your private data to anyone who would be interested in seeing it. If there are several devices in your house, all connected by the same network, you might infect them all in just a few minutes with the malware downloaded on your device.

    Use a VPN when connecting to public Wi-Fi. The Virtual Private Network will encrypt your data so that your important information won’t get stolen.

    To maximize your security level, you should install efficient and reliable software that will keep you protected — for example, MacKeeper. This solution provides multi-layered protection from online threats and optimizes the performance of your device. It includes antivirus, an ad cleaner, a memory cleaner, and an update tracker. Unnecessary pop-ups won’t bombard you, and viruses will be detected well before they attack you.

    What to do if you Mac was hacked or caught a virus

    If your device caught a virus, follow these steps:

    1. Remove all the questionable extensions. Open the list of the extensions in your browser and delete manually all of those that you didn’t install on purpose.
    2. Remove all the questionable apps. It’s not enough to remove just the icon of the app: you need to drag to the trash both the app and all the files related to it. Be careful, because if you accidentally remove the files of the useful apps, the device won’t function properly. Otherwise, you can delete the apps quicker and easier with MacKeeper.
    3. Create a new user profile. Viruses often attach to a particular user profile. But if you start a new profile and transfer all your important data to it, you’ll probably be safe.

    Modern antiviruses are powerful and user-friendly. Scan your Mac once per month even if there are no visible threats, and run additional scans each time after you connect to a public Wi-Fi network.

    In most cases, you can scan your Mac, detect malware, and delete it without professional help. However, remember to regularly update your antivirus and never switch it off.

    Have any thoughts on this? Let us know down below in the comments or carry the discussion over to our Twitter or Facebook.

    No one wants to become compromised by hackers or malware. Use this guidance to help you protect your accounts and devices.

    Protect your accounts

    It’s important that you protect your accounts whether it’s a personal account such as a Microsoft account, or a work or school account someone in your organization created for you.

    Take precautions with sensitive info

    Don’t send emails that include sensitive information such as passwords, credit card numbers, passport numbers, or other government issued identification such as a social security number or other tax related identification.

    Watch out for scams

    Watch out for phishing attacks which try to trick you into providing sensitive information, or clicking a malicious link or attachment.

    Some examples of phishing scams look like messages from what appears to be a legitimate source such as a bank or an official looking institution. The message invites you to sign in with your email address and password, but it’s actually a fake website. Other scams look like emails from someone you know which asks you to click a link or open an attachment.

    Phishing messages usually have links or attachments. When you click the link in the message or open the attachment, your computer can become infected or an attacker can gain access to your content.

    If you receive an email that looks even slightly suspicious, do the following:

    Hover over the link and look for the name of the actual website the link is sending you to. Make sure it’s what you expect and not misspelled.

    Go to the legitimate website using your own saved favorite or bookmark, or from an internet search, instead of clicking a link in the message.

    If you receive a message from someone you know, but it looks a bit unusual, it could mean the sender’s email account and contact list was compromised. Contact the sender directly and describe the mail you just received and ask if it was legitimate.

    Use two-factor authentication

    Two-factor authentication (2FA), also called two-step verification, or multi-factor authentication (MFA) is an extra layer of security to ensure that only you are accessing your account. When you set this up, any time you sign in to your account from an unrecognized computer or other device, or if you add your account to an app or a service for the first time, you’re prompted to verify that it’s okay. The verification message can be sent via an authentication app such as the Microsoft Authenticator app on your smartphone, a text message, an email sent to an alternate address, or a phone call which requires you to enter a pin.

    If your work or school accounts are using Microsoft 365, your Microsoft 365 admin or IT department may have enabled this for all accounts in the organization. If so, you’ll be prompted to take this extra step.

    For a personal Microsoft account, you can set this up yourself and indicate your preferred verification method. For example, you can request verification from an authentication app such as the Microsoft Authenticator app, a text message, or alternate email account.

    Protect your password

    Don’t use the same password for all your accounts.

    Make sure your password is strong and avoid using actual words. The current recommendations for strong passwords include at least 12 characters, a combination of upper and lowercase letters, at least one number from 0-9, and a symbol.

    Tip: Third-party online services are available to help you generate and remember unique passwords for sites you visit regularly.

    Protect your phone or tablet

    Only run and install apps from a legitimate source such as the app store for your device.

    If you’re using Microsoft 365, use Microsoft apps which work better with Microsoft 365 and are more secure.

    Keep your devices, and any software or mobile apps you’re using up-to-date. Many of the updates you receive are security fixes so be sure to install operating system updates, and any software or app updates.

    Enable the lock feature on your phone or table that requires you to unlock the device with a PIN, fingerprint, or facial recognition.

    Protect a computer running Windows 10 or a Mac

    The following are specific things you can do if you’re computer is running Windows 10, or if you have a Mac.

    Turn on BitLocker device protection

    Bitlocker protects data when devices are lost or stolen. BitLocker Drive Encryption provides full disk encryption on Windows 10 PCs. If the device is lost or stolen unauthorized users can’t gain access to files on the protected drives, including files synced from OneDrive for Business.

    Protect your PC with Microsoft Defender

    When you start up Windows 10 for the first time, Microsoft Defender is on and actively helping to protect your PC by scanning for malware (malicious software), viruses, and security threats. Microsoft Defender uses real-time protection to scan everything you download or run on your PC. Windows Update downloads updates for Microsoft Defender automatically to help keep your PC safe and protect it from threats.

    Turn on Windows Firewall

    You should always run Windows Firewall even if you have another firewall turned on. Turning off Windows Firewall might make your device (and your network, if you have one) more vulnerable to unauthorized access.

    Use FileVault to encrypt your Mac disk

    Disk encryption protects data when devices are lost or stolen. FileVault full-disk encryption helps prevent unauthorized access to the information on your startup disk

    Protect your mac from malware

    Microsoft recommends you install and use reliable antivirus software on your Mac.

    You can also reduce the risk of malware by using software only from reliable sources. The settings in Security & Privacy preferences allow you to specify the sources of software installed on your Mac.

    Turn on firewall protection

    Use firewall settings to protect your Mac from unwanted contact initiated by other computers when you’re connected to the Internet or a network. Without this protection your Mac might be more vulnerable to unauthorized access.

    We design Mac hardware and software with advanced technologies that work together to run apps more securely, protect your data, and help keep you safe on the web. And with macOS Big Sur available as a free upgrade, it’s easy to get the most secure version of macOS for your Mac.*

    More secure
    hardware means more secure software.

    Apple M1 chip.
    A shared architecture for security.

    The Apple M1 chip with built-in Secure Enclave brings the same powerful security capabilities of iPhone to Mac — protecting your login password, automatically encrypting your data, and powering file-level encryption so you stay safe. And the Apple M1 chip keeps macOS secure while it’s running, just as iOS has protected iPhone for years.

    Apple helps you keep your Mac secure with software updates.

    The best way to keep your Mac secure is to run the latest software. When new updates are available, macOS sends you a notification — or you can opt in to have updates installed automatically when your Mac is not in use. macOS checks for new updates every day and starts applying them in the background, so it’s easier and faster than ever to always have the latest and safest version.

    Safely run apps like never before.

    Protection starts at the core.

    The technically sophisticated runtime protections in macOS work at the very core of your Mac to keep your system safe from malware. This starts with state-of-the-art antivirus software built in to block and remove malware. Technologies like XD (execute disable), ASLR (address space layout randomization), and SIP (system integrity protection) make it difficult for malware to do harm, and they ensure that processes with root permission cannot change critical system files.

    Download apps safely from the Mac App Store. And the internet.

    Now apps from both the App Store and the internet can be installed worry-free. App Review makes sure each app in the App Store is reviewed before it’s accepted. Gatekeeper on your Mac ensures that all apps from the internet have already been checked by Apple for known malicious code — before you run them the first time. If there’s ever a problem with an app, Apple can quickly stop new installations and even block the app from launching again.

    Your data. Your rules.

    Stay in control of what data apps can access.

    Apps need your permission to access files in your Documents, Downloads, and Desktop folders as well as in iCloud Drive and external volumes. And you’ll be prompted before any app can access the camera or mic, capture keyboard activity, or take a photo or video of your screen.

    FileVault 2 encrypts your data.

    With FileVault 2, your data is safe and secure — even if your Mac falls into the wrong hands. FileVault 2 encrypts the entire drive on your Mac, protecting your data with XTS-AES 128 encryption. Mac computers built on the Apple M1 chip take data protection even further by using dedicated hardware to protect your login password and enabling file-level encryption, which developers can take advantage of — just as on iPhone.

    Safer browsing with Safari.

    Designed to protect your privacy.

    Online privacy isn’t just something you should hope for — it’s something you should expect. That’s why Safari comes with powerful privacy protection technology built in, including Intelligent Tracking Prevention that identifies trackers and helps prevent them from profiling or following you across the web. A new weekly Privacy Report on your start page shows how Safari protects you as you browse over time. Or click the Privacy Report button in your Safari toolbar for an instant snapshot of the cross-site trackers Safari is actively preventing on that web page.

    Automatic protections from intruders.

    Safari uses iCloud Keychain to securely store your passwords across all your devices. If it ever detects a security concern, Password Monitoring will alert you. Safari also prevents suspicious websites from loading and warns you if they’re detected. And because it runs web pages in separate processes, any harmful code is confined to a single browser tab and can’t crash the whole browser or access your data.

    macOS has many features that help protect your Mac and your personal information from malicious software, or malware. One common way malware is distributed is by embedding it in a harmless-looking app.

    You can reduce this risk by using software only from reliable sources. The settings in Security & Privacy preferences allow you to specify the sources of software installed on your Mac.

    On your Mac, choose Apple menu

    > System Preferences, click Security & Privacy, then click General.

    If the lock at the bottom left is locked , click it to unlock the preference pane.

    Select the sources from which you’ll allow software to be installed:

    App Store: Allows apps only from the Mac App Store. This is the most secure setting. All the developers of apps in the Mac App Store are identified by Apple, and each app is reviewed before it’s accepted. macOS checks the app before it opens the first time to be certain it hasn’t been modified since the developer shipped it. If there’s ever a problem with an app, Apple removes it from the Mac App Store.

    App Store and identified developers: Allows apps from the Mac App Store and apps from identified developers. Identified developers are registered with Apple and can optionally upload their apps to Apple for a security check. If problems occur with an app, Apple can revoke its authorization. macOS checks the app before it opens the first time to be certain it hasn’t been modified since the developer shipped it.

    In addition to apps, other types of files may not be safe. Scripts, web archives, and Java archives have the potential to cause harm to your system. Of course, not all files like this are unsafe, but you should exercise caution when opening any such downloaded file. An alert appears when you first try to open these files. See Open an app by overriding security settings.

    Before we start

    Having spent some years coding applications for macOS we’ve created a tool that everybody can use. The all-round problem fixer for Mac.

    How to protect your mac from malware

    So here’s a tip for you: Download CleanMyMac to quickly solve some of the issues mentioned in this article. But to help you do it all by yourself, we’ve gathered our best ideas and solutions below.

    Features described in this article refer to the MacPaw site version of CleanMyMac X.

    If you’re worried that your Mac’s keyboard is being recorded by a keylogger there are a number of steps you can take to find out and then remove it.

    How do keyloggers work?

    Keyloggers record the keystrokes typed on your Mac’s keyboard. There are two types of keyloggers, sofware- and hardware-based, which connect to a USB port on your Mac. Once the keystrokes have been recorded, anyone with access to the keylogger can see what has been typed on the keyboard, including usernames, passwords, bank details, and the content of instant messages and emails. Hackers use keyloggers to do just that.

    Who uses keyloggers?

    There are lots of instances where keyloggers can be used, from parents who want to monitor their children’s computer use or companies that want to snoop on employees, to hackers who use them to try and discover passwords.

    While there are lots of legitimate (depending on your point of view) uses of keyloggers, there are also lots of ways in which they’re used unethically and in some cases illegally, so it’s important to know how to protect your Mac.

    Can Macs get keyloggers?

    Yes, there are several keyloggers available for the Mac. Known Mac keyloggers include Aobo Mac Keylogger, Refog Keylogger, and Spyrix Keylogger for Mac. They are among the top 10 Mac keyloggers.

    How to check your Mac for keyloggers

    The first thing to do is to check for a hardware keylogger. This is likely to be plugged into your keyboard or somewhere between your keyboard and your Mac –if you use an external keyboard.

    If there’s no sign of a hardware keylogger, the next step is to launch Activity Monitor.

    1. Go to Applications>Utilities and double-click Activity Monitor
    2. Check for processes that look like they might be keyboard loggers
    3. If you find one, write down its name
    4. Go to Applications>Utilities and launch Terminal
    5. Type: man [name of process] – where [name of process] is the process you wrote down. Type it’s name without the square brackets
    6. You should see a description of the process in the Terminal window

    If the keyboard logger was installed by malware, it will likely be sending back the log of keystrokes to a remote server, known as ‘phoning home’. You can check for this by using an app called Little Snitch, which alerts you whenever a process on your Mac phone’s home and allows you to block it.

    What should I do if I find a keyboard logger?

    There are two possibilities if you find a keyboard logger on your Mac: that someone put it there deliberately by sitting in front of your Mac and fitting or installing it, or that you downloaded malware that contained the keyboard logger. In the latter situation, you should attempt to remove it using the steps below. However, if it was installed by, say an employer on your work Mac, you should speak to them.

    How to remove a keylogger

    If the keyboard logger was installed via malware, you can get rid of it using antivirus software. There are several antivirus tools for Mac, like BitDefender or Avast, for example, that you can download free and use to scan your Mac. Depending on the application, you may then have to pay for a full version to get rid of any malware it finds.

    Another option is to use CleanMyMac X. CleanMyMac X has a malware removal tool that has a regularly-updated database of known malicious code. You can use that to scan your Mac at the press of a button. If CleanMyMac X finds anything, all it takes as a press of another button to remove it.

    How to protect your mac from malware

    If you’ve tried running a malware removal or antivirus tool and still suspect you may have a keylogger on your Mac, your next option might be to perform a clean install of macOS. Make sure you backup your data before you do. But don’t restore from the backup — that will reinstall the keylogger. Instead, once you’ve erased your boot drive and reinstalled the OS, start installing applications one by one, then copy your data manually from the backup.

    How can I protect my Mac from keyloggers?

    You can protect your Mac from hardware keyloggers by never leaving it unattended. That may not be possible, of course, especially in a work environment, so if you suspect someone will attempt to fit one, check your Mac every time you return to it.

    Implementing the usual common sense approach to using your Mac will also help protect you from keyloggers, since those downloaded as malware rely on your clicking a link to download them.

    1. Don’t click in a link in any email message unless you’re certain where the email has come from and where the link leads.
    2. Install an ad-blocker in your web browser
    3. Heed the warning if your browser tells you a site you’re about to visit is unsafe
    4. Ignore pop-ups telling you that you need to update Flash or any other part of your Mac
    5. Use strong passwords and keep them safe in a password manager, rather than writing them down
    6. Use CleanMyMac X or an antivirus tool to scan your Mac regularly

    Discovering a keylogger on your Mac is at best unsettling and at worst, distressing, particularly if you don’t know who put it there or why. However, there are several ways to remove it, whether it’s hardware or software. And once you’ve got rid of it, using the steps described above should makes sure you never have to worry about finding one again.

    Malwarebytes 4 takes out malware, adware, spyware, and other threats before they can infect your machine and ruin your day. It’ll keep you safe online and your Mac running like it should.

    Free download comes with a 14-day trial of Premium.

    Make your Mac

    Proven Malwarebytes technology crushes the growing threat of Mac malware. So you are protected and your machine keeps running silky smooth. Finally, cybersecurity smart enough for the Mac.

    Protects you from Mac threats

    Detects and removes viruses, ransomware, and other malware in real time with advanced anti-malware technology. Catches dangerous threats automatically, so you’re protected without having to even think about it.

    Protects you from Mac threats

    Detects and removes viruses, ransomware, and other malware in real time with advanced anti-malware technology. Catches dangerous threats automatically, so you’re protected without having to even think about it.

    Removes adware and unwanted programs

    Crushes adware and potentially unwanted programs that slow your Mac. Your Mac experience will remain clean and pristine.

    Removes adware and unwanted programs

    Crushes adware and potentially unwanted programs that slow your Mac. Your Mac experience will remain clean and pristine.

    Scans Mac-fast

    Scans the average Mac in under 30 seconds. Run the malware scanner in the background while you boot up your favorite game and it’s done by the time you’re ready to play. You can even customize your scans to run when you’re not using your Mac at all, at any day, at any time.

    Light and lean

    Only the size of three digital music files. That means more disk space for your movies, music, and apps.

    Stops unwanted apps

    Blocks applications from developers who are known to release unwanted software like malware, PUPs, or adware. App Block outsmarts developers who try to bypass security by releasing a slightly different version of their app. Learn more

    Active protection or
    simple disinfection?

    Download Malwarebytes for Mac (the free version) and you get a 14-day trial of the premium version with automatic (real-time) virus and malware protection. After 14 days, your trial reverts to a limited disinfection scanner. Buy the premium version now to prevent infection in the first place.

    • Cleans infected Mac
    • Prevents Mac virus, spyware, and malware infections
    • Proactively blocks adware and unwanted programs
    • Scans can be scheduled to run at any time
    • Updates to the latest Malwarebytes protection automatically
    • Blocks apps from developers of unwanted software
    • Expires after 14 days
    • Expires after 14 days
    • Expires after 14 days
    • Expires after 14 days
    • Expires after 14 days



    Cleans infected Mac

    Prevents Mac virus, spyware, and malware infections

    Proactively blocks adware and unwanted programs

    Scans can be scheduled to run at any time

    Updates to the latest Malwarebytes protection automatically

    Blocks apps from developers of unwanted software