Mac Mechanic is potentially unwanted program for Mac OS, that looks like legitimate application for system optimization and virus removal. It originates from India. After the test on new MacBook Mac Mechanic finds several “high-risk” problems and demands from 19.95 to 49.95 Euros for solving. However, some of the results are false, which puts the program to the category of rogue software. When users try to uninstall Mac Mechanic by moving it to trash it says “application cannot be deleted”.
Mac Auto Fixer (a clone of rogue Mac Defender) is bogus Mac OS optimization and antivirus utility. It claims to find numerous errors, viruses and other issues on clean machines. After deeper research those problems appear to be non-existent or not essential. Mac Auto Fixer asks 118 Euros for a 2 year license to fix these issues. There are and there will be lots of applications similar to Mac Auto Fixer, but with other name and design.
Mac Tonic, similar to Win Tonic, is rogue optimization and security application for Mac OS. Although, it has look and feel of a legitimate program, Mac Tonic was designed to earn money on unnecessary Mac tweaks, pseudo-optimization and other features, that can be achieved by means of operating system options itself or by using free programs. It is installed on computers without users consent and adds itself to Mac startup. After installation Mac Tonic scans your system for viruses and errors, and always finds something even on brand new machines. Then it offers to purchase it to fix the issues. If users ignore it, program starts displaying alerts on the desktop.
PremierOpinion by VoiceFive Networks is potentially unwanted program, that can infect Windows and MacOS systems. It can be classified as spyware and adware. Some users report ads and pop-ups by PremierOpinion, some indicate survey pop-ups in the bottom-right corner of the desktop. Research of recent versions of PremierOpinion shows, that this application collects private information about users computers without any permission and transmits this data to its servers. This data includes web surfing habits, program usage statistics, computer configuration, e-mails, adresses. There are obviously many unpleasant ways to use this information.