Just check the top 5 places
from where laptops have been stolen or lost:
Trunk of a car
(as a result of burglary)
In today’s world we become more and more “tied up” to Internet services, software, hardware, etc. We share our information with them, we share our information with our banks, medical institution, we share our information with our employer who saves it in their databases. We share our information with smartphones, smart TV’s, smart watches, smart homes and other “smart things” which usually retain our information in the databases as well. Such technologies are deeply integrated into our lives so we become dependent on them. This makes us vulnerable when technology fails.
We conduct security researches trying to locate any data exposures in databases of various companies, organisations, institutions, etc. Please take into account the fact that we do not hack into, break systems, databases, archives, directories, depositories or other storages that contain any personal information and that were protected from unauthorised access. All accessible databases that we discovered were unsecured and unprotected in any way.
Here, in Security Research Center, we do our best to:
We also have a good belief that our security researches will improve the security of personal data and alert users of breach possibilities.
We make security researches with the help of Shodan search engine for Internet-connected devices. This search engine is publicly accessible. We do not use any hacking programmes, crack passwords or authentication processes or other hacking tricks.
The process of our vulnerability reporting comply with the following guideline:
Yes, we retain some information we found but this is made solely for evidence purposes.
We retain this information to protect our company in disputes and proceedings, to comply with legal obligations, meet regulatory requirements, etc. By doing such researches we may be accused or being suspected in hacking so we are forced to make screenshots and/or store some information in order to something to back up our statements.
Chris Vickery is a Security Researcher who helps us to build a better security environment worldwide. He is also our official contractor who works according to a formal agreement between him and Kromtech Alliance Corp, providing us with exclusive written blog posts, regarding his adventures in securing data, which give us an opportunity to better fulfill our mission.
In case you have any comments, tips or suggestions please contact: firstname.lastname@example.org.
Stay tuned to the latest security news by visiting MacKeeper Security Research Center.
Trunk of a car
(as a result of burglary)
What to do if your Mac is stolen?
Open Track My Mac mobile app on your smartphone.
Select the missing device.
Tap ‘Report Stolen’
Login to your MacKeeper Account.
Proceed to the Anti-Theft tab.
Click ‘Report Stolen’
How to Create a Perfect Trap for a Thief and Increase the Chances of Finding Your Missing Mac
It is not a secret that none of Anti-Theft systems will work & track your Mac unless the thief connects to the Internet with the missing computer. So does MacKeeper Anti-Theft.
It means that only after your Mac goes online being reported as stolen, we will:
Strange as it may sound, you actually want to encourage the thief to use the stolen laptop, so that you can track the location of your Mac and capture the photo of the person who’s using it.
If you are like most Mac owners, you probably have a single personal administrative user account on your laptop, and probably you have it configured for automatic login. As a result, you can use your laptop without entering a password after startup, or after waking from sleep. This is a desirable situation from the viewpoint of Anti-Theft operation, because the thief can immediately use the laptop without needing a password to unlock the Mac.
Unfortunately, the problem with automatic login is that it also gives the thief full access to your personal data and emails. To protect your privacy, a better solution is to create a guest user account that the thief can use, and configure your laptop so that your personal account is password protected.
Note that creating a guest account is strongly recommended but not required. If you really don’t care if the thief has access to your personal account, you can skip creating a guest account and use Anti-Theft “as is”, provided that your personal account is configured for automatic login.
However, most people will probably prefer to maintain their privacy and create a guest account.
You should first use your administrative account to create an Anti-Theft guest account on your laptop with the Users & Groups pane in System Preferences.
Please refer to Apple documentation for creating a standard account on your Mac or follow our step-by-step instructions:
So now, after you created a trappy “Guest User” account on your Mac, you also need to make sure that your Mac is not set to automatically log in during the startup and all Login Options are set properly.
Here is how you should do that:
That’s it. Now you have created a perfect security trap for a thief by installing MacKeeper Anti-Theft and creating a Guest Account. As you may find, having a guest account can be very useful, as it allows you to lend your laptop to someone while keeping your own data private. Don’t hesitate to use the guest account for other purposes besides Anti-Theft.
PS: Please refer to Anti-Theft detailed tutorial to learn how to properly set up all Anti-Theft tools.
Partnership with Google's Geolocation Service and the MapQuest Web Mapping Service allows MacKeeper™ Anti Theft to more accurately pinpoint the location of a missing computer and even identify the Wi-Fi networks and trace IP addresses used.