

#REIKEY VIEWBRIDGEAUXILLARY SOFTWARE#
The 'nuclear option'Īnother method to ensure no software keyloggers are installed is by wiping the drive and reinstalling the operating system from scratch. When you find a process that you aren’t familiar with, you’ll need to do a Google search for it to determine what it’s associated with, which is why this approach is very time-consuming. The specific steps for launching and using the tool (based on your version of the macOS) are located at. This detection method is best used by those with a technical background who are familiar with the macOS as you’ll have to weed through and research a large number of items that will appear in this utility. Activity monitorĪnother method of tracking down suspicious processes that may be running on your computer is through a utility called "Activity Monitor." This utility can scan your MacBook and monitor any future installations of software that may appear to be nefarious. The tool is called "ReiKey" and the instructions for downloading and using the tool are located at the Objective-See website.
#REIKEY VIEWBRIDGEAUXILLARY DOWNLOAD#
If your security software doesn’t have this capability or you aren’t sure, a free download is available from a former NSA hacker who started a nonprofit foundation to help users. If you have a security suite installed on your computer, check that company’s support website to see if it specifically scans for keyloggers. Software keyloggers can be more difficult to detect and may require a bit of time and technical know-how to track down. Since you have a laptop, an inline keyboard device isn’t possible, and if something strange was plugged into one of your ports, you probably would have noticed it already. Keyloggers can be used via a physical device (hardware) or through a hidden program (software). Q: Is there a simple way to see if someone has installed a keylogger on my MacBook?Ī: The nefarious use of keyloggers can allow a third party to record every keystroke you make and generally is used to gain access to your accounts and private information.ĭepending upon the type of keylogger, it can be complicated and very time-intensive to track down and remove this type of software.
