1 / 3
In today’s world we have become more and more connected to Internet services, software, and hardware devices.
We share our information with our banks, medical institutions, and employers. We share our information with smartphones, smart TVs, smart watches, and other “smart things” in our homes, which usually retain our information in the remote databases outside our control. These technologies are deeply integrated into our lives and, in many cases, we have become dependent on them, making us vulnerable when the technology fails or our information is not properly protected.
We conduct security research to locate any data exposures in the databases of various companies, organisations, and institutions.
Typically we use the Shodan search engine to locate unprotected Internet-connected devices. This search engine is publicly accessible, and allows researchers to identify devices and databases that are connected to the open Internet without any password protection or other technological barriers to safeguard the data stored in them. We do not crack passwords or authentication processes or use any other hacking tricks.
Once we discover a publicly exposed database, we report our findings according to the following guidelines:
Here, in the Security Research Center, we do our best to:
In case you have any comments, tips or suggestions please contact: firstname.lastname@example.org
The third generation of MacKeeper with 18 smart tools.Download View Screenshots
The second generation of MacKeeper with 16 Mac apps in one.View Screenshots
The very first generation of MacKeeper with 14 system tools.View Screenshots
As of January 2016, MacKeeper 1.x and 2.x are no longer maintained.
This includes bug fixes, development of new features, and 24/7 customer support.
We strongly recommend updating to MacKeeper 3.x or MacKeeper 4.x. Both are fully supported and secure.