How to Check MacBooks for Hacks

Techwalla may earn compensation through affiliate links in this story. Learn more about our affiliate and product review process here.

A computer is hacked when an unauthorized user gains access to your personal files, software and private information. There are a wide range of viruses and trojans that can affect your computer. If malicious software is downloaded into the computer, hackers can use it to gain access and to remotely control the computer device. If a computer has been compromised or hacked, it displays signs of unauthorized changes. Viruses that attack computers are often hidden within files downloaded from the internet. In order to prevent hackers from gaining access to your MacBook, install anti-virus software or firewalls and update them on a regular basis.

Advertisement

How to Determine if your MacBook has Been Hacked

Video of the Day

Step 1

Turn on the MacBook.

Video of the Day

Step 2

Click on "System Preferences" in the Apple menu. Once the window opens, click on "Accounts," then click on "Login" Items.

Advertisement

Step 3

Use the "- sign" to remove items that you do not recognize from the list.

Step 4

Note the applications you were using when the problem first occurred and review any software that was recently installed.

Advertisement

Step 5

Check your network activity in your Activity Monitor by locating this file in your Applications/Utilities folder. It will display a list of the processes, statistics, applications, and programs that are currently being used by the computer.

Step 6

Note any consistent action in the Activity Monitor. If you see purposeful activity, then it is likely that an unauthorized user has connected to your computer using remote access.

Advertisement

Advertisement

Step 7

Click on the "System Preferences" window in the Apple menu and launch the System Preferences application. Open the Sharing reference window.

Step 8

If Screen Sharing is enabled for the computer, note users who are currently allowed access to the computer. If you see suspicious activity, disable the Screen Sharing application.

Advertisement

Step 9

Disconnect from the network, unplug the Internet cable and turn off the computer.

Step 10

If problems persist, consult a computer technician.

Advertisement

Advertisement

references & resources