18 in 1 Apps for Mac

Files Recovery

Now you can recover files that were once deleted from the Trash!

Files Recovery
Disk<br/>Usage

Visualize the size of the folders on your hard drive so you can tell at a glance which folders are taking up the most space.

Disk Usage
Data<br/>Encryptor

Make your restricted files absolutely invisible to anyone without the right password, protecting even your most sensitive information.

Data
Encryptor
Backup

Backing up your important files and folders is an easy, fast and reliable way to keep them safe and secure.

Backup
Duplicates Finder

Delete unnecessary copies of your files and free up disk space on your Mac.

Duplicates Finder
Update Tracker

With Update Tracker you will never miss out any important security patches and upgrades for most of your applications.

Update Tracker
Human<br/>Assistance

Automatically optimizes and monitors your Mac's RAM memory while you are performing your daily tasks.

Memory Cleaner
Adware Cleaner

Detect and remove malicious software that may display unwanted ads.

Adware Cleaner
Internet Security

Protect your Mac from phishing attacks, malware, spyware, adware, viruses and identity theft while you're using the Internet.

Internet Security
Human<br/>Assistance

Your personal assistant has the solution for your technical problem - whether it is a minor annoyance or a catastrophic failure.

Human
Assistance
Fast Cleanup

Quickly remove junk files (such as temporary caches, logs, unused language packages and legacy application parts) that may take up hard drive space and slow down your Mac.

Fast Cleanup
Anti-Theft

If your Mac gets stolen, Anti-Theft will track its location and even make an iSight snapshot of the thief.

Anti-Theft
Smart<br/>Uninstaller

Prevent future junk by making sure that you're not just sweeping old applications under the rug when you are trying to delete them.

Smart
Uninstaller
Shredder

Securely delete files and folders that you don't ever want to be recovered.

Shredder
Files<br/>Finder

Quickly search for and find any lost or misplaced file, even if you don't know in which folder it is located.

Files
Finder
Login Items

Take control of how fast your Mac boots up by deciding which applications launch every time you start it.

Login Items
Default<br/>Apps

The easiest way to define which application will open each file type.

Default
Apps
Geek on<br/>Demand

Geek on Demand is the ultimate tool when you have a problem or question that is related to your Mac's health and need an expert's opinion or technical assistance.

Geek on
Demand
  • Unique System Kit
  • Apple Certified Assistants
  • Anti-Theft Coverage

Choose Your License:

Prepaid plans
Month-to-month plan
You pay today: $ = * $

Advanced Buyer Protection Policy

Incorrect Code
-0%

As Seen On:

Macworld

MacKeeper™
is the most advanced way to take
care of your Mac...

— Macworld EXPO

+

Security Research Center Policy

In today’s world we have become more and more connected to Internet services, software, and hardware devices.

We share our information with our banks, medical institutions, and employers. We share our information with smartphones, smart TVs, smart watches, and other “smart things” in our homes, which usually retain our information in the remote databases outside our control. These technologies are deeply integrated into our lives and, in many cases, we have become dependent on them, making us vulnerable when the technology fails or our information is not properly protected.

Our research

We conduct security research to locate any data exposures in the databases of various companies, organisations, and institutions.

Typically we use the Shodan search engine to locate unprotected Internet-connected devices. This search engine is publicly accessible, and allows researchers to identify devices and databases that are connected to the open Internet without any password protection or other technological barriers to safeguard the data stored in them. We do not crack passwords or authentication processes or use any other hacking tricks.

Once we discover a publicly exposed database, we report our findings according to the following guidelines:

  • When appropriate, we provide details of the data exposure to the company, organisation, or institution that failed to protect itself.
  • We do not modify the data we found.
  • We allow entities time to remedy the data exposure prior to making any details available publicly that would otherwise cause further risk.
  • We do not transfer any data to any third parties.

Why do we do this?

Here, in the Security Research Center, we do our best to:

  • Help businesses build better security by identifying data leaks, and
  • Raise public awareness to the dangers related to data breaches and security risks in the connected world.

In case you have any comments, tips or suggestions please contact: security@kromtech.com

Wait! Don´t go empty-handed

Get 25% off any MacKeeper™ plan today

View plans offering a 25% discount
View plans offering a 25% discount