O i need antivirus software if i am going to download office 365 onto my new imac?

Do i need antivirus software if i am going to download office 365 onto my new imac?

1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
If you find this comment too long or too technical, read only sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
   3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
It can easily be disabled or overridden by the user.
A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
   For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
Software from an untrustworthy source
Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
Software that is plainly illegal or does something illegal
High-priced commercial software such as Photoshop is "cracked" or "free."
An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
Conditional or unsolicited offers from strangers
A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
You win a prize in a contest you never entered.
Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
Anything online that you would expect to pay for is "free."
Unexpected events
You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
   6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
Why shouldn't you use commercial "anti-virus" products?
To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Research has shown that most successful attacks are "zero-day"—that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
Most importantly, a false sense of security makes you more vulnerable.
8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
A Windows malware attachment in email is usually easy to recognize by the file name alone. An actual example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to know that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may be useful if it satisfies an ill-informed network administrator who says you must run some kind of "anti-virus" application.
The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Similar Messages

  • Do you need antivirus software for Macs?

    Hi there,
    I purchased a new iMac yesterday, and I was wondering if I need antivirus software for it?  Thanks!

    There are two trains of thought here. Ultimately you'll need to decide which one fits you and your usage.
    In general, there are no true viruses on Mac OS X - that is, no software that can just infect your machine and self-replicate without any user involvement.
    However, that's not to say that malware doesn't exist. There are several known trojans on Mac OS X - software that's advertised to do one thing but actually doesn't something else (generally malicious) behind the scenes. These applications typically use some social-engineering or other guise to fool you into thinking they're legitimate - for example, you might visit a web site that pops up a message saying you need a certain software update in order to access the site, along with a link to 'conveniently' install that software, only to find it's installing something completely different.
    The difference here is that trojan applications like this require some kind of user input and usually require you to authenticate your username and password in order to install. If you only install trusted software and are smart about knowing when you should/should not need to enter your password then you're pretty immune from such tricks. If there are multiple users on the machine (especially if they all have admin access), this problem becomes compounded since it only takes one person to let down their guard.
    Then, there's the third class of malware in which your machine becomes a vehicle for viruses, even if you're not affected yourself. A classic example here is email and/or distributing software that gets opened on othe platforms. For example, if you recieve a document that's infected with a Windows virus, it can and will do nothing on your machine. However, if you then forward that document to other users, they may open it thinking it's trusted (it came from someone they know), only to find it infects their machine.
    This kind of problem is more prevalent in mixed-platform corporate environments, and is exascerbated when you consider that things like Microsoft Word documents and PDF files have been carriers of this kind of malware in the past.
    A good anti-virus application would detect and identify these kinds of malware, even though they cannot affect your machine itself.
    So, do you need anti-virus? Probably not if you're careful and don't share much content with other users (especially other users on other platforms). However, there's generally little downside to doing so.

  • Does os x mountain lion need antivirus software?

    Does os x mountain lion need antivirus software?

    No, beyond what's built into the OS. If you want more, use ClamXav.
    (70225)

  • I recently bought a KoboGlo ereader. Several days ago I bought an ebook from Booktopia. However I was unable to download the ebook onto my new ereader. I was told that I needed to load Adobe DRM which I did. When I contacted Booktopia they told me that wh

    I recently bought a KoboGlo ereader. Several days ago I bought an ebook from Booktopia. However I was unable to download the ebook onto my new ereader. I was told that I needed to load Adobe DRM which I did. When I contacted Booktopia they told me that when I authorised my Adobe DRM I should have  "select 'Booktopia' next to Vendor ID, and then log in using your Booktopia account details ie email address [email protected] and your Booktopia password as the password."
    I erased my Adobe DRM software from my computer and reloaded it but I seem to be unable to convince your software that I want to start over... it keeps telling me that I am using an ID and password that was used to authorise another computer!
    What do I do?
    A frustrated customer!
    Bob Ross
    [email protected]

    In order to make your posts easier to read I suggest that you not type in all caps.
    The operating system on your Gateway system is Windows based, as are all of the applications that you had installed. Your iMac uses the Mac OS X operating system. The applications on your external hard drive that you pulled from the Gateway system will not directly run on your iMac. One option is to purchase Mac OS X versions of the software where possible, or your can install Window's on your iMac and have the capability to use both Mac OS X and Windows.
    Since you are a new Mac user it may be best to go back to your place of purchase and spend some time learning about your options for transferring your data and options. According to the Stamps.Com website, they apparently don't make a Mac OS X version of the software, but they supposedly allow you to print directly using the Mac's web browser. Microsoft sells a Mac OS X version of their Office suite which you can view at http://www.microsoft.com/mac/products.
    Here's some more information that helps people like you who are converting from Window's to the the Mac OS X environment. There is some learning to do, but like me, I think you'll like it once you have everything configured correctly.
    http://www.apple.com/support/switch101/

  • Need a script to enable in-place hold on Office 365

    Hello, I need a script to enable in-place hold on Office 365 for my users.
    The options that I have found for this so far is to enable in-place hold for a DL or an individual user. Is there a way to use a CSV instead?
    This is what I have used before.....where "allstaff" is the name of a DL.
    New-MailboxSearch -name "3 Year In-Place Hold" -SourceMailboxes allstaff -InPlaceHoldEnabled $true -ItemHoldPeriod 1095

    That doesn't seem to work.........I think it's trying to create a new hold query for every user.
    PS C:\scripts> ./user_hold.ps1
    WARNING: The hold setting may take up to 60 minutes to take effect.
    Name                CreatedBy           InPlaceHoldEnabled  Status
    3 Year In-Place ... S-1-5-21-2495351... True                NotStarted
    Unable to execute the task. Reason: A mailbox search named <3 Year In-Place Hol
    d> already exists or is currently being deleted. Please choose a different name
        + CategoryInfo          : InvalidArgument: (Microsoft.Excha...DiscoverySea
       rch:MailboxDiscoverySearch) [], MailboxSearchTaskException
        + FullyQualifiedErrorId : [Server=BLUPR06MB097,RequestId=e8df9b95-2e00-428
       d-813f-da05ea8d09d4,TimeStamp=11/5/2013 9:38:05 PM] [FailureCategory=Cmdle
      t-MailboxSearchTaskException] 95CD9ECA
    So my next question...........how do I add users to an existing In-Place hold?

  • I have just purchased an iMac which has no CD Drive, when I downloaded my Elements 8 from my external drive onto my new iMac I just get Error Code 150.30 does this mean that I have no way of retreiving my existing software?

    I have just purchased an iMac which has no CD Drive, when I downloaded my Elements 8 from my external drive onto my new iMac I just get Error Code 150.30 does this mean that I have no way of retrieving my existing software?

    According to Adobe instructions installation files are not available for Elements 8?
    Languages
    Mac OS X
    Windows
    English—International
    English—Universal
    German
    Japanese
    French
    French—Canada
    Chinese—China
    Dutch
    Italian
    Portuguese—Brazil
    Spanish
    Spanish—Latin America
    Spanish—North America
    Swedish
    Not available
    File 1 of 2 (1.2 MB)
    File 2 of 2 (1.1 GB)

  • HT5654 I have the lastest itunes software but I'm trying to restore a backup onto the new iphone 5s and I get an error message and cannot restore? Any advice

    I have the lastest itunes software but I'm trying to restore a backup onto the new iphone 5s and I get an error message and cannot restore? Any advice

    If iTunes is otherwise working properly start with TS1538: iOS: Device not recognized in iTunes for Windows, in particular section 5, otherwise move on to Troubleshooting issues with iTunes for Windows updates.
    tt2

  • I need to reinstall my photoshop extended CS5 onto my new iMac, what is the link needed to enter the serial number?

    Hi i have deactivated my original CS5 on my old iMac, i need to reinstall this onto my new iMac but can't find the link to this version, can anyone help me with the CS5 link so i can rest all this, many thanks, Lisa

    Click on the Photoshop Elements 12 link and the Windows, English link will appear

  • Do I need antivirus software for iPad and iPhone

    I'm new to the apple world and enjoying the gadgets.  Just wondering if I need to purchase antivirus software for my iPad and iPhone.

    Anti virus software doesnt' really exist because it's not needed. The way things are coded viruses won't run on the iPad's operating system.

  • Do MacBook Pros need antivirus software?

    I had installed McAfee which interfered with the AirPort Extreme wireless. Apple tech said no antivirus was needed and that Apple does not support McAfee software. Any thoughts on whether antivirus software is needed and if so whether there are programs that work with AirPort Extreme?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real danger comes from highly targeted "zero-day" attacks that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you care? In practice, there's seldom a reason to use the software unless an institutional policy requires it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Do imac need antivirus software

    do OS X 10.8.4 need antivirus.I recently come across Mac Keeper antivirus software on my mac.What to do with that and how to remove it from mac

    Read the comment by SDW2001 in this thread.
    Remove "MacKeeper" as follows. First, back up all data.
    "MacKeeper" has only one useful feature: it deletes itself.
    Note: These instructions apply to the version of the product that I downloaded and tested in early 2012. I can't be sure that they apply to other versions.
    IMPORTANT: "MacKeeper" has what the developer calls an “encryption” feature. In my tests, I didn't try to verify what this feature really does. If you used it to “encrypt” any of your files, “decrypt” them before you uninstall, or (preferably) restore the files from backups made before they were “encrypted.” As the developer is not trustworthy, you should assume that the "decrypted" files are corrupt unless proven otherwise.
    In the Finder, select
    Go ▹ Applications
    from the menu bar, or press the key combination shift-command-A. The "MacKeeper" application is in the folder that opens. Quit it if it's running, then drag it to the Trash. You'll be prompted for your login password. Click the Uninstall MacKeeper button in the dialog that appears. All the functional components of the software will be deleted. Reboot.
    Failure to remove MacKeeper will result from neglecting any one of these points:
    Quit MacKeeper before dragging it to the Trash.
    Don't empty the Trash after dragging the application to it. Let MacKeeper delete itself.
    Don't try to drag the MacKeeper icon in the Dock to the Trash.
    Here are some general suggestions. If you want your computer to be usable, don't install crapware, such as “themes,” "haxies," “add-ons,” “toolbars,” “enhancers," “optimizers,” “accelerators,” "boosters," “extenders,” “cleaners,” "doctors," "tune-ups," “defragmenters,” “firewalls,” "barriers," “guardians,” “defenders,” “protectors,” most “plugins,” commercial "virus scanners,” "disk tools," or "utilities." With very few exceptions, this stuff is useless, or worse than useless.
    The more actively promoted the product, the more likely it is to be garbage. The most extreme example is the “MacKeeper” scam.
    The only software you should install is that which directly enables you to do the things you use a computer for — such as creating, communicating, and playing — and does not modify the way other software works. Never install any third-party software unless you know how to uninstall it.

  • I have just bought my first MacBook Air do you need antivirus software?

    I have just bought my first MacBook Air should I have antivirus software like you do for a Windows base PC?

    I don't recommend anti-virus software for a Mac. Such software often causes more issues than it solves.
    Be careful about the websites you visit, the links you follow, and the attachments you open and you should be fine.

  • IPhone 5s wireless connectivity issues, cannot upload files/state to iCloud, and supposedly needing to do so in order to get my files/state onto a new iPhone 6 Plus

    I am trying to get my files from my old iPhone 5s onto my new iPhone 6 Plus. I am currently and have been using iCloud to backup my files/state. However, I believe the antenna on the iPhone 5s went kaput a few months ago, because the Wi-Fi and Bluetooth, both, do not work at all, meaning, I have tried all solutions including, resetting network settings, restarting the phone, etc. This is problematic because, as far as I know the iPhone 5s needs to be connected to Wi-Fi or Bluetooth to a Wi-Fi Hotspot in order to ask the internet, in order to upload current information/state to iCloud. Herein lies my problem.
    I have used iCloud already, to download my current files/state to my iPhone 6, with a caveat, these are only the files/state from before the antenna supposedly went kaput. That means, that all of my files/state since that time, while still being on my iPhone 5s, is not uploaded to iCloud, which then means I do not have it on my iPhone 6 which was updated to the most current files/state that was available at the time.
    What do I do?
    I have iTunes installed on a Windows 7 and Windows 8.1 Computer, and I have made a backup on there. However, I have to admit, I find iTunes very counter-intuitive and very difficult to use/understand. And I'm mostly referring to the syncing/backing-up features. I know you have to have safe guards to protect software usage, but with this high-minded philosophy of minimalism, couldn't it be as easy as drag and drop? Even software syncing? USB syncing with iCloud, etc?

    Thank you for the information. I checked out the section and read it through. From what I can gather, you can start your new iPhone from an itunes backup (Set Up Iphone > Restore from iTunes Backup), but, in my situation I need to add the Files/State from the old iPhone backup to the new iPhone that was started from scratch and has it's own unique Files/State, without subtracting from either. The problem is, that I don't want to subtract anything, and from what I understand about Syncing, if I am Syncing a new iPhone that's been started up, edited, has it's own suite of apps, etc. to an old backup of a previous iPhone, I am going to lose everything new I've done, as it will sync with the previous Files/State.

  • How do I load my new Photoshop software onto my new iMac when there is no CD drive?

    I just purchased a new iMac and Adobe Photoshop CS6 Extended but can't load the new software since there is not CD drive. How do i download it from Adobe's website?

    Or download the installer from here:
    http://prodesigntools.com/adobe-cs6-direct-download-links.html
    Be sure to read & follow the "Note: Very Important Instructions" section to avoid error.

  • Do I need antivirus software with MS Office for Mac on my Macbook Pro?

    I am brand new to a Mac and just recently bought a MacBook Pro. I also purchased MS Office 2011 for Mac and have installed it. I've heard you don't need anitvirus for a Mac but I didn't know if having MS Office installed on my Mac made the circumstance any different. Any help if appreciated.

    No. Since Office for Mac runs under OS X and not Windows, no antu-virus software is needed.
    Allan

Maybe you are looking for

  • Problem in GUI status of ALV Grid

    Hello All Experts, I have a following issue. Am displaying a report using   REUSE_ALV_GRID_DISPLAY. I have copied the GUI status from standard GUI   STANDARD_FULLSCREEN. Now when i dispaly the report i get  select all ICON just before my first column

  • Can not install Adobe Air 3.1.0.4880

    Hope I am in the right place. Tried to install Air does not install. Here is the log: [2012-01-31:15:39:13] Bootstrapper begin with version 3.1.0.4880 on Win x86 [2012-01-31:15:39:13] Installed runtime (2.0.2.12610) located at c:\Program Files\Common

  • Quicktime 7.6.4 won't play h264 encoded videos on my 10.4.11 MacMini

    Hello: This is my first post. I read through the forums and this seems to be the correct place to pose my question. If it's not, my apologizes. I'm trying to find out why Quicktime 7.6.4 won't play h264-encoded video on my MacMini (G4 PPC). I'm runni

  • WATCHING RENTED MOVIES ON HOLIDAY.

    I want  to rent a movie in iTunes and watch it on a cruise ship in the area of Norway and the Arctic Circle.. I know iTunes can advise me, but has anyone any  adverse experience of watching rented movies in areas other than where the movie was downlo

  • Formatting external drive for iMovie 09

    Hi. I am trying to format my new external hard drive to my MacBook Pro but it keeps failing and coming up with an error. I am trying to format it to Mac OS X (Journaled) but as i said i keep getting an error message and i don't know why. Anyone else