Thank you for choosing CyberBit Antivirus and Internet Security
CyberBit was developed to help any Mac users to protect their devices from malware. The software features that we will discuss in this help manual are:
For any other problems you can easy email us at [email protected] or you can check the FAQ section .
Quick Scan can be performed by following the steps:
Deep Scan can be performed by following the steps:
Custom Scan can be performed by following the steps:
Adware Scan can be performed by following the steps:
Active Malware Protection is a module that will look for the changes in your Downloads folder and will execute scans in order to see if there are any malware downloaded. E.g: If you will download a malware file such as MacKeeper, the active protection will let you know that the file can be malicious.
You can turn on or off the Active Malware Protection from the main console by clicking the Turn off/on button or from the menu bar.
Network Scan is a masterpiece that is useful when you are connected to your home wireless network. Even your wireless network is password protected, a recent found vulnerability is affecting major wireless routers and basicaly a skilled hacker can hijack your network and intercept your traffic. By intercepting your network traffic, the hacker can gain access to your passwords, social accounts, banking details and many more.
What Network Scan will do? – it is simple, it will map your entire wireless network and will let you know, how many devices are actually connected to your wireless network.
So for instance you possess 1 Mac, 1 iPhone and 1 iPad, a total of 3 devices. If after the Network Scan, CyberBit will report you that there are more than 3 devices connected to your network, this means that someone is illegally connected to your network and may be hijacking your traffic
Network Scan can be performed by following the steps:
The power of any antivirus comes from it’s malware pattern database. A malware pattern database is a file that contains the signatures of malware that the antivirus can identify. A poor database means poor detection.
Malware pattern must be updated before doing a malware scan, in order to receive from our servers the newest database.
Malware Pattern Update can be performed by following the steps:
After a malware or adware scan is complete, the application will prompt the scan results, showing which files are identified as threats.
On the scan results window you will notice the following elements:
To perform a full delete of all the identified malware click on the Delete all button.
If you want to delete some of the identified files, you must click on the checkbox located near each identified file in order to select it and then click the Delete selected button.
To export the scan results, go for the Export results button and select the filename and the path where you want to save the log with the results.
Some malware are using now evasion techniques in order to prevent the antivirus software to delete its files. CyberBit is able to identify if a malware file is protected, and will prompt you in a easy to use interface to manual delete it.
After you hit the Delete all or the Delete selected button, the software will start to delete the identified infected files. If there are any protected files found, a notification window will appear showing which of them can’t be deleted
The following steps must be completed in order to perform a manual delete:
In this section you will find some solutions for common problems found among the Mac users.
Steps to Uninstall CyberByte Antivirus.
Steps:
sudo curl https://mac.cyberbyte.org/uninstall.sh -o uninstall.sh && sudo sh uninstall.sh
First let’s understand what are this ads and popups.
Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. Pop-ups are generally new web browser windows to display advertisements. The pop-up window containing an advertisement is usually generated by JavaScript that uses cross-site scripting (XSS), sometimes with a secondary payload that uses Adobe Flash. They can also be generated by other vulnerabilities/security holes in browser security.
For a complete clean of your Mac you must complete the following steps in order:
Some malware developers are using hidden files techniques in order to hide malware files from the users.
By default the Mac operating system is not showing the hidden files. In order to view the hidden files you must perform the following steps:
defaults write com.apple.finder AppleShowAllFiles YES