iPhone and iPad Mac

Watch Out For These 4 Keyloggers For Mac

Joshua Lockhart 29-08-2011

keyloggers for macBefore I get started writing this article, I’m just going to say that Apple does a good job protecting its customers from malware, viruses, and various other mythical beasts on the internet. However, a lot of monitoring software still exists for Mac, and you should know about it, right?


I’m going to be honest with you in that I didn’t download any of these at all, and this was done for two reasons – they aren’t free, and I don’t trust them.

Just know that the first purpose of this article is to let you know that this enemy actually exists, and the second purpose is to help you know your enemy by name.

Spector Pro [Snow Leopard]

keyloggers for mac

As a product of SpectorSoft, Spector Pro markets itself as a way to check in on the kids or make sure that your employees are staying on task. It even prides itself with its ability to block websites and specific contacts on instant messaging. However, we all know that this doesn’t mean people wouldn’t use it for malicious reasons. (As a note, the website also has some sketchy user testimonials anyway.)

Besides its basic run-of-the-mill keylogging methods, Spector Pro forwards all emails, transferred files, and screenshots to its primary operator (read: stalker). Also, like most keyloggers, the software will likely run in stealth mode if it is being used on you, so just keep that in mind. However, at the price of $99, the perpetrator would likely use it only if they had serious intentions.


SniperSpy [Snow Leopard]

mac keylogger

SniperSpy is one of three spy-related pieces of software produced by Retina-X Studios. Once again, we have the typical explanation of “Watch your children!” and “Watch your employees!”. However, in addition to its basic functions of screenshot capturing, location mapping (based on the current IP) and keylogging, SniperSpy allows its operator to view everything that you are doing totally live in a VNC How To Spy On Your Spouse With Your Computer Read More -like fashion.

Basically, as you are typing out your romantic messages to your hypothetical forbidden lover, your spouse could be watching you as it happens. Another feature allows for operators to send the computer user an onscreen message – perhaps something classic like, “All your base are belong to us.”

Aobo Keylogger [Snow Leopard & Lion]

mac keylogger


Aobo claims that you can use the software to “spy and discover the truth” and “get back a stolen Mac”. This is perfectly fine and seemingly honest, but there is always the chance someone might have ulterior motives while using it. The website for this software is a little iffy, so just keep in mind its users could be equally so.

The software comes in two varieties – standard and pro – and both of them collect the standard information that any keylogger would. However, the professional version is noted for its ability to record passwords that are typed in-browser, and it claims to have been the first keylogger for Mac to do so. All logs (including screenshots, keystrokes, and websites) can be sent to the operator’s email or FTP 8 Free FTP Clients For Mac Read More .

Amac KeyLogger [Snow Leopard & Lion]

mac keylogger

Much like the other monitoring programs mentioned in this article, Amac Keylogger requires the operator to install the software on the actual computer itself. Granted, this could always possibly be done remotely by a well-versed operator, but in the meantime, just reconsider who regularly plugs flash drives into your computer.


Amac Keylogger functions just as you would expect it would – it watches you do whatever you do, sending information of your activities to the mystery man behind another screen. Although it displays itself as employee monitoring software, it is easily exploitable. If you download it once, it monitors all user accounts on the Mac in question, and it always will open up in stealth mode on the user’s computer. Also, much like Aobo, the professional version of this software can record passwords.


Keep in mind that Apple does subtly protect its users from these Internet demons anyway, but if you want a basic method to combat keyloggers yourself, you should take a look at this MUO article – 4 Ways To Protect Yourself Against Keyloggers 5 Ways to Protect Yourself Against Keyloggers Keyloggers are one of the most feared threats to computer security. Heed these tips so you don't fall victim to hackers. Read More . Besides this, remember to always update your OS to prevent unintentional installation, and don’t be surprised that some people do not. Take this example – a close friend of mine who works primarily with Macs once knew someone who hadn’t done so since the day that they bought it!

keyloggers for mac

Have you ever encountered an attack on your Mac? Do you have any further knowledge about the ones mentioned here? Share with us in the comments.


Related topics: Anti-Malware, Keylogger, OS X Snow Leopard, Spyware.

Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.

Whatsapp Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. So and So
    February 15, 2017 at 12:32 am

    Elite Keylogger for Mac OSX tried to take control of my computer. So I don't trust it.

  2. S. Bernahl
    October 20, 2016 at 6:24 pm

    When a scammer can not penetrate your computer, they will try to attach their computer to your e-mail accounts such as Google.
    Google, for example can be accessed on other computers not just your home/personal computer. Nigeria is a hot bed of hackers, cyber theft, etc. among other countries. If you go to your Google account, click on devices & security, you will see all the machines attached to your google account. To my surprise Google sent me an e-mail asking me to check on these and I found one new addition a Nigerian windows computer was newly attached for just a day (this began at night through Firefox to get to my Google Account). I changed passwords, deleted saved passwords (had to change those too), instituted the 2 step security option with my iPhone to reconnect to my mac and have been sending Google several requests to delete the illegal Nigerian windows computer from being attached to my account. Holding my mouse over the icon for the windows computer does not produce the delete button either. To date Google has not deleted this attachment, claiming their policy is to leave it for two weeks before deleting, even though I have told them this is cyber crime/terrorism. I find this very disturbing, when time is super important for safety and they should be working with US cyber crime authorities.

  3. Alex Smith
    May 23, 2015 at 7:57 am

    You also can try Elite Keylogger for Mac OS X. The free version performs well and comes with a nice interface and useful features.

  4. Amac Keylogger User
    September 8, 2011 at 8:17 am

    I said it was my work computers. It's my job to test applications working on Mac and, if possible, recommend a best one to my customers. While some people may doubt the legitimacy of keyloggers, there are people who are in need of them, you know.

  5. Amac Keylogger User
    August 31, 2011 at 7:58 am

    I am testing Amac Keylogger on my leopard, snow leopard and lion (my work computers), it is devilishly effective. Unlike Aobo, it doesn't work under Tiger. 

    • J. Lockhart
      August 31, 2011 at 2:03 pm

      I'm actually glad you commented on here. I think we can all look at this objectively at the moment.

      What purposes do you use it for exactly?

  6. Aobo Mac Keylogger
    August 30, 2011 at 2:06 pm

    Thanks for the great review~

  7. Peter
    August 30, 2011 at 8:15 am

    "Apple does a good job protecting its customers from malware, viruses, and various other mythical beasts on the internet" and "Keep in mind that Apple does subtly protect its users from these Internet demons anyway, "
    How is that?

    • J. Lockhart
      August 30, 2011 at 3:24 pm

      On the software updates, Apple typically counters any of the latest hardcore anti-Mac developments out there. Furthermore, I believe there is a subtle security program (nothing fancy) that runs in the background. (I don't have a source for that at the moment, so if you can prove me wrong, by all means do so.) 

      Needless to say, a Mac could always become infected – just like a PC – but Apple does make a solid effort. I'm not saying that there aren't things out there to attack Macs, and I am also not saying a Mac couldn't get screwed over because of some malicious software, but I am saying that Apple does a decent job at keeping up with the latest threats.