Do I need to run a third party anti virus checker if I suspect email swishing?

Do I need to run third party antivirus if I suspect email swishing?

I'm not familiar with the term "swishing." Do you mean "phishing," which is the act of trying to trick you into divulging personal information or installing malware through an e-mail message that pretends to be from a legit company?
If so, and if you clicked the link, there are some things we need to know before we can be sure you are safe:
- What version of Mac OS X are you running (see About This Mac in the Apple menu if you don't know)?
- Do you have Java enabled in your web browser? (See disable Java in your web browser, if is isn't already disabled, the answer is yes.)
- If Java is enabled, is Java actually installed? (Go to Java Tester... do you see a pink rectangle, and if so, what does it say?)

Similar Messages

  • Lumia 1020 - Is it possible to run a third party s...

    Hello There,
    Is it possible to run any third party softwares on Nokia Lumia 1020, e.g i have created a software to access my server through remote access but im not sure if it will work on phone as it works on my laptop.
    Please advice.
    Moderator's note: The subject was edited as the post was moved to the moved to the most appropriate board.

    Seeing there are several apps in the store doing just that I do not see how that would be a problem.
    Click on the blue Star Icon below if my advice has helped you or press the 'Accept As Solution' link if I solved your problem..

  • If I upgrade to Lion do I need to reinstall my third party software?  Office, etc

    If I upgrade to Lion do I need to reinstall my third party software?  Office, etc

    If you install Lion in place and are using versions supported in Lion, no.  You should check with your third party software vendors to see whether upgrades are required to work with Lion.  For example, since you mentioned Office, the 2008 and 2011 versions are compatible with Lion.  The 2004 version is not. It is generally a good idea to upgrade your apps first, and then upgrade to Lion, as you may sometimes need the older version of the app to migrate data to the new version.

  • Do Windows 8.1 Users Need Third-Party Anti-Malware Software?

    Do Windows 8.1 Users Need Third-Party Anti-Malware Software?

    It depend. Until you make decision update your Defender regularly and stick with general security measures.
    Regards
    Milos

  • I've just downloaded FF 4 beta, do i still need to purchase internet security software & anti-virus software for protection?

    I have not renewed my McAfee. i am not sure whether FF 4 beta security protection is good enough. I do internet banking often. do i still need to have other security or anti-virus software?

    Firefox is just a web browser, you still need anti-virus, anti-malware and firewall protection.

  • Need to Allow Certain Third-Party Applications via MDM

    I just deployed a computer lab of iMacs and Minis and am using Yosemite/Server 4 to manage them. All computers are running 10.10.1
    I Profile Manager>Restrictions, I want to allow users to use many native OS X applications but additionally I need to allow a handful of third-party applications to run.
    In Restrictions>Apps I have the option to "Restrict which apps are allowed to launch" and then create an allow list but it only allows native apps to be added. There is the option to allow and disallow folders, but no indication of where (Users or Mac HD Level) or how (naming and file path) those folders should be configured.
    Can anyone give me some resources or pointers here?
    I will add that this is my first OS X server deployment. I am well versed in the AD environment as well as the OS X as operating system.

    Negative. I want to allow users to open a specific list of applications--both native and third-party while disallowing others. For example: I want to be able to open Safari, Pages, Net Beans and Google Chrome but not Terminal, FaceTime, and Photo Booth.

  • Need info on configuring Third Party Systems on Soln Mgr

    Hi All,
    I have installed Solution Manager 4.0 on Windows 2003 Server and Oracle 10.2.0.2 and need to integrate Third Party Systems like E3, HighJump and Marketmax on it.
    What we are basically looking for is configuring the Service Desk functionality so that tickets are generated from these systems.
    Can any one provide me with any kind of help as to how to go about doing this ? I am almost done with configuring the Basic Settings in the IMG to implement the Service Desk. I say almost because it does ask me to create a System Landscape and I donot want the SAP Systems to be monitored.
    Thanks,
    Kunal

    Hi
    Can u please send me the Steps for configuring the Basic settings in IMG to implement the service desk.(what r the step to be done)
    Regards,
    Neni

  • Can I run a third party executable from LabView?

    I have a third party image sensor executable. Is it possible to start this executable from a LabView VI? I know that you can run a dll from LabView. I was wondering if you can do the same with a standard .exe file.

    Yes, you can use the "System Exec.vi", located in different spots depending on which version you're using.
    It acts as a command line interface - essentially the same as if you run CMD.
    Search for it in the help if you can't find it in your palette.

  • Can't update Adobe AIR after Yosemite update and need it for a third-party app.

    I updated to Yosemite and had some issues. After receiving help from Apple, I could not open a third-party app; it said I needed to update Adobe AIR. When I tried to do that, I got the same message saying I needed to update AIR again. I tried uninstalling and installing AIR but without success. What steps do I need to take?

    I had a similar problem when trying to install Zinio.air. I have made it all work out. What i did was remove Adobe Air 15 entirely from the Utiliites and Library/ accounts and preferences. I then downloaded Adobe Air 13 and installed and then clicked on Zinio .air and it all installed ok. I also had to temporarily change security settings from Apple approved to Anywhere. All functioning now.

  • Best option for profilling app running in third party propritery platform?

    hi !!
    i am involved with a legacy project wherein jdk1.3.1 was used for development, the java code is deployed in a propritery platform/server ( meant for telecom applications). The server was basically meant for C++ modules but with popularity of Java the vendor started supporting deployment of Java modules as well...but its still a lot away from being called good enough :(
    My problem is some memory leaks that i am facing in the application, and coz the JVM is started internally by the third party server/platform based on some configuration info on what all java code is to be executed. I am not in control of starting somethign like hprof....
    what arethe best ways to do profilling in such a scenario?? can something like hprof be executed programmatically ?? ( as i get control of JVM once its started by the 3pp/platform )
    Or the other option might be plugging in some JNI code on JVMTI..but unfortunately time doesnt support choosing that option....:(
    ( i would go for that in worst case scenario but am just hunting out some cheaper options available)
    I hope am able to convey the problem ....
    rgds

    check out OptimizeIt

  • Need Automatic trigger of Third Party

    Dear SAP Gurus,
    I have a requirement.  We have some materials and this materials are either delivered by Company itself or sometimes by Vendors. Now the requirement is whenever this material is not there in the stock, system should automatically triggered Third Party Sales.
    How can we achieve this requirement? Plz assist me in this.
    Thanks.
    Regards,
    Tiwari

    Normally in that case, what the seller will do is they order directly on the vendor, inward the material and process sales activities.  Can you reconfirm your client is not following this practice which is predominantly being followed in all manufacturing industries?
    G. Lakshmipathi

  • Third party sales availabilty Checking

    Hello,
    I have configured third party sales . In the development system it is creating purchase requisition and purchase orders and working fine.  But when I transport to QA system , the sales order is performing availability check and confirming orders against the inventory . I can see the purchase requisition information in the schedule line , but purchase requistion is not getting created . Please help
    thanks in advance
    Tom

    Hi,
    Check the OSS notes  Note 210423 - Availability screen for third-party items.
    The details are;
    Summary
    Symptom
    The Availability Control Screen is displayed when you create a sales order even though no availability check should be carried out for a third-party item or individual purchase order item (item category TAS and TAB).
    Additional key words
    Third-party order, third-party, availability check, individual purchase order
    Cause and prerequisites
    Solution
    This is a standard functionality.
    The Availability Control Screen is confused here with the Purchase Order Scheduling Screen. You can tell which screen you are on by the header of the screen:
    Availability control: Availability check for non- TAS / TAB items
    Purchase order scheduling: Scheduling for TAS / TAB items
    The Purchase Order Scheduling Screen, like the availability screen, is always displayed if the requested delivery date cannot be observed because the realistic delivery date of the purchase requisition comes after the requested delivery date.
    If the requested delivery date of the customer is sufficiently far in the future, the purchase order scheduling screen is not displayed.
    Source code corrections
    Header Data
    Release Status:     Released for Customer
    Released on:     03-29-2000  22:00:00
    Master Language:     German
    Priority:     Recommendations/additional info
    Category:     Consulting
    Primary Component:     SD-SLS-SO-TP SD Third-party order processing
    Affected Releases
    Release-Independent
    Regards,

  • Do I need to have any type of anti-virus or malware, spyware protection for my Macbook Pro?

    My Macbook is a year old. When I bought it, I was told by several people that I would not need any type of anti-virus software or anything to protect my computer because Mac did not get infected that often. However, I have had people today tell me that I do need protection for my computer. My Mac runs about as good as the day I got it, but I really don't want anything to happen to it. If I need to get an anti-virus, or malware/spyware software, what programs would y'all recomend? I am just looking for information. Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • NEED TO INTEGRATE WITH THIRD PARTY (ALPHATRUST) BY MAKING HTTPS REQUEST FRO

    We have a custom OA-framework based project going live almost immediately. I am responsible for the piece that needs to
    integrate with a service provider, Alphatrust, that we use for signatures. My
    code worked fine in my local JDeveloper environment using a java.net.URL object
    to get a URLConnection. It turns out that my local configuration is defaulting
    to use Sun's http client that is included in the JDK/JRE, while the appserver
    has the configuration java.proto .handler.pkgs=HTTPClient which makes it use
    (I think) some version of the open source client at
    http://www.innovation.ch/java/HTTPClient/. With this configuration my outbound
    request sending xml post data fails with a ClassCast exception thrown from
    HTTPClient.HTTPConnection.getSSLSocket(HTTPConnection.java:1933). I have two
    candidate workarounds in mind.
    (1) remove the configuration java.protocol.handler.pkgs=HTTPClient.
    I have tested this option and it does fix the problem. However I am concerned that it may have unintended
    consequences, such as possibly breaking our Verisign integration.
    (2) place an alternate http client library on the classpath, such as Jakarta Commons
    HttpClient, and use it. But (a) I don't know exactly how to place extra jar's
    onto the classpath on the application server and (b) I don't know what the
    support implications vis-a-vis Oracle would be.
    Please advise. Would you recommond option (1), (2), or is there yet another option that I have not
    thought of? Please treat this request as urgent.
    Here is the java code, from my application module, that fails on the application server.
    OutputStreamWriter wr = null;
    BufferedReader rd = null;
    URLConnection conn = null;
    // System.getProperties().remove("java.proto .handler.pkgs");
    // if I uncomment the above line, it works, but I am concerned about
    // the impact on, for example, Verisign integration
    URL url = new URL("https://pronto1.alphatrust.com/prontosvr2/prontoxml.asp");
    conn =
    url.openConnection();
    conn.setDoOutput(true);
    conn.setRequestProperty("Content-Type", "text/xml");
    Object outs = conn.getOutputStream();
    // the last line above throws a ClassCastException

    Not sure if you have seen oracle.apps.fnd.framework.webui.OAUrl and whether it fits your scenario.
    OAUrl class is used for generating, modifying URL objects in OAF.
    --Shiv                                                                                                                                                                                                                                                                                                                                                                   

  • How can I file share with another person if both of us are using Mac operating systems?  Do we need to use a third party file sharing system or does apple have this capability?

    How can I file share with another personif both of us are using Mac operating systems (one of us using a Mac laptop and the other using iMac).  Our intention is to have a working document that can be changed by both parties over time and both parties will have visibility to the others changes.

    Use SugarSync

Maybe you are looking for

  • How to use multiple tables in developing one Graph in Endeca Integrator

    We have the requirement where we want to show the matrix for a particular entity which is coming from two separate table, there is a join which is possible on both the tables to get the correct data. But we are not able to find how to use data from t

  • Logic Pro won't start anymore

    It's the latest Logic Pro 9.1.8 If i try to open any project I see the GUI for about three seconds but it's frozen. Then Logic crashes. If i open Logic without any project or with the audio engine disabled or with all AUs disabled makes no difference

  • Error at end of installation Service (Apple Mobile Device) failed to start - help

    Hi, I'm trying to downloade iTunes onto my laptop and keep receiving the error "Service (Apple Mobile Device) failed to start. Verify that you have suffficient privileges to start system services" Can anyone help please?

  • How to include private reports in any page for a websheet application

    Hi, i have created a websheet application, it has n number of data grids. For some data grids i had created reports, which got classified as private reports by default. i would like to display these reports in a page of my websheet application, when

  • What is Top-N analysis

    What is Top-N analysis.?? can some one explain. I encountered this while going thru the Sql book The ORDER BY clause in the subquery is not needed unless you are performing Top-N analysis.