Just check the top 5 places
from where laptops have been stolen or lost:
Trunk of a car
(as a result of burglary)
In today’s world we have become more and more connected to Internet services, software, and hardware devices.
We share our information with our banks, medical institutions, and employers. We share our information with smartphones, smart TVs, smart watches, and other “smart things” in our homes, which usually retain our information in the remote databases outside our control. These technologies are deeply integrated into our lives and, in many cases, we have become dependent on them, making us vulnerable when the technology fails or our information is not properly protected.
We conduct security research to locate any data exposures in the databases of various companies, organisations, and institutions.
Typically we use the Shodan search engine to locate unprotected Internet-connected devices. This search engine is publicly accessible, and allows researchers to identify devices and databases that are connected to the open Internet without any password protection or other technological barriers to safeguard the data stored in them. We do not crack passwords or authentication processes or use any other hacking tricks.
Once we discover a publicly exposed database, we report our findings according to the following guidelines:
Here, in the Security Research Center, we do our best to:
In case you have any comments, tips or suggestions please contact: firstname.lastname@example.org
Trunk of a car
(as a result of burglary)
What to do if your Mac is stolen?
Open Track My Mac mobile app on your smartphone.
Select the missing device.
Tap ‘Report Stolen’
Login to your MacKeeper Account.
Proceed to the Anti-Theft tab.
Click ‘Report Stolen’
How to Create a Perfect Trap for a Thief and Increase the Chances of Finding Your Missing Mac
It is not a secret that none of Anti-Theft systems will work & track your Mac unless the thief connects to the Internet with the missing computer. So does MacKeeper Anti-Theft.
It means that only after your Mac goes online being reported as stolen, we will:
Strange as it may sound, you actually want to encourage the thief to use the stolen laptop, so that you can track the location of your Mac and capture the photo of the person who’s using it.
If you are like most Mac owners, you probably have a single personal administrative user account on your laptop, and probably you have it configured for automatic login. As a result, you can use your laptop without entering a password after startup, or after waking from sleep. This is a desirable situation from the viewpoint of Anti-Theft operation, because the thief can immediately use the laptop without needing a password to unlock the Mac.
Unfortunately, the problem with automatic login is that it also gives the thief full access to your personal data and emails. To protect your privacy, a better solution is to create a guest user account that the thief can use, and configure your laptop so that your personal account is password protected.
Note that creating a guest account is strongly recommended but not required. If you really don’t care if the thief has access to your personal account, you can skip creating a guest account and use Anti-Theft “as is”, provided that your personal account is configured for automatic login.
However, most people will probably prefer to maintain their privacy and create a guest account.
You should first use your administrative account to create an Anti-Theft guest account on your laptop with the Users & Groups pane in System Preferences.
Please refer to Apple documentation for creating a standard account on your Mac or follow our step-by-step instructions:
So now, after you created a trappy “Guest User” account on your Mac, you also need to make sure that your Mac is not set to automatically log in during the startup and all Login Options are set properly.
Here is how you should do that:
That’s it. Now you have created a perfect security trap for a thief by installing MacKeeper Anti-Theft and creating a Guest Account. As you may find, having a guest account can be very useful, as it allows you to lend your laptop to someone while keeping your own data private. Don’t hesitate to use the guest account for other purposes besides Anti-Theft.
PS: Please refer to Anti-Theft detailed tutorial to learn how to properly set up all Anti-Theft tools.
Partnership with Google's Geolocation Service and the MapQuest Web Mapping Service allows MacKeeper™ Anti Theft to more accurately pinpoint the location of a missing computer and even identify the Wi-Fi networks and trace IP addresses used.