1 / 3
In today’s world we become more and more “tied up” to Internet services, software, hardware, etc. We share our information with them, we share our information with our banks, medical institution, we share our information with our employer who saves it in their databases. We share our information with smartphones, smart TV’s, smart watches, smart homes and other “smart things” which usually retain our information in the databases as well. Such technologies are deeply integrated into our lives so we become dependent on them. This makes us vulnerable when technology fails.
We conduct security researches trying to locate any data exposures in databases of various companies, organisations, institutions, etc. Please take into account the fact that we do not hack into, break systems, databases, archives, directories, depositories or other storages that contain any personal information and that were protected from unauthorised access. All accessible databases that we discovered were unsecured and unprotected in any way.
Here, in Security Research Center, we do our best to:
We also have a good belief that our security researches will improve the security of personal data and alert users of breach possibilities.
We make security researches with the help of Shodan search engine for Internet-connected devices. This search engine is publicly accessible. We do not use any hacking programmes, crack passwords or authentication processes or other hacking tricks.
The process of our vulnerability reporting comply with the following guideline:
Yes, we retain some information we found but this is made solely for evidence purposes.
We retain this information to protect our company in disputes and proceedings, to comply with legal obligations, meet regulatory requirements, etc. By doing such researches we may be accused or being suspected in hacking so we are forced to make screenshots and/or store some information in order to something to back up our statements.
Chris Vickery is a Security Researcher who helps us to build a better security environment worldwide. He is also our official contractor who works according to a formal agreement between him and Kromtech Alliance Corp, providing us with exclusive written blog posts, regarding his adventures in securing data, which give us an opportunity to better fulfill our mission.
Stay tuned to the latest security news by visiting MacKeeper Security Watch blog with Chris Vickery.
Second generation of MacKeeper™ with basic versions of 16 system tools.Download View screenshots
First generation of MacKeeper™ with basic versions of 16 system tools.Download View screenshots
Starting from January 2016, MacKeeper™ 1.x and 2.x are no longer maintained.
This includes bug fixes, new development, and 24/7 customer support.
We strongly recommend updating to the latest MacKeeper™ 3.x version in order to use the fully supported and secure software.