Thank you for choosing CyberByte Antivirus and Internet Security
CyberByte was developed to help any Mac users to protect their devices from malware. The software features that we will discuss in this help manual are:
For any other problems you can easily email us at [email protected] or you can check the FAQ section .
Quick Scan can be performed by following the steps:
Deep Scan can be performed by following the steps:
Custom Scan can be performed by following the steps:
Adware Scan can be performed by following the steps:
Active Malware Protection is a module that will look for the changes in your Downloads folder and will execute scans in order to see if there are any malware downloaded. E.g: If you will download a malware file such as MacKeeper, the active protection will let you know that the file can be malicious.
You can turn on or off the Active Malware Protection from the main console by clicking the Turn off/on button or from the menu bar.
Network Scan is a masterpiece that is useful when you are connected to your home wireless network. Even your wireless network is password protected, a recently found vulnerability is affecting major wireless routers and basically a skilled hacker can hijack your network and intercept your traffic. By intercepting your network traffic, the hacker can gain access to your passwords, social accounts, banking details and many more.
What will Network Scan do? - it is simple, it will map your entire wireless network and will let you know, how many devices are actually connected to your wireless network.
So, for instance, you possess 1 Mac, 1 iPhone and 1 iPad, a total of 3 devices. If after the Network Scan, CyberByte will report you that there are more than 3 devices connected to your network, this means that someone is illegally connected to your network and may be hijacking your traffic
Network Scan can be performed by following the steps:
The power of any antivirus comes from its malware pattern database. A malware pattern database is a file that contains the signatures of malware that the antivirus can identify. A poor database means poor detection.
Malware pattern must be updated before doing a malware scan, in order to receive from our servers the newest database.
Malware Pattern Update can be performed by following the steps:
After a malware or adware scan is complete, the application will prompt the scan results, showing which files are identified as threats.
On the scan results window you will notice the following elements:
To perform a full delete of all the identified malware click on the Delete all button.
If you want to delete some of the identified files, you must click on the checkbox located near each identified file in order to select it and then click the Delete selected button.
To export the scan results, go to the Export results button and select the filename and the path where you want to save the log with the results.
Some malware is using now evasion techniques in order to prevent the antivirus software to delete its files. CyberByte is able to identify if a malware file has elevated file permissions, and will prompt you in an easy to use interface to manually delete it.
After you hit the Delete all or the Delete selected button, the software will start to delete the identified infected files. If there are any files with elevated file permissions found, a window will show which of them can't be deleted
The following steps must be completed in order to perform a manual delete:
In this section you will find some solutions for common problems found among the Mac users.
First, let's understand what are this ads and popups.
For a complete clean of your Mac you must complete the following steps in order:
Some malware developers are using hidden files techniques in order to hide malware files from the users.
By default, the Mac operating system is not showing the hidden files. In order to view the hidden files you must perform the following steps:
defaults write com.apple.finder AppleShowAllFiles YES