Is McAfee required?

Just taken out a new BB contract with BT.  McAfee A/V, branded as BT NetProtect Plus, is offered.
I have a years subscription of Kaspersky Internet Security 2012 for £13.
Even with 3 months free - at £3.49/mnt - McAfee'll be £31.49 a year (this appears to cover 7 PCs/macs)
Do I need McAfee?  What are the benifits?
As I already have a decent A/V (cheaper) I don't think I'd need McAfee.  Installing two A/Vs is not a good idea so I'm not thinking of using them together.
Solved!
Go to Solution.

Infact here is Which?'s rating of McAfee Internet Security 2012.
However, they gave Kaspersky Internet Security 2012 58% which I don't really agree with. 
Computer Shopper recently gave KIS2012 a A-List recommended rating.
Anti-malware
Email monitoring
Firewall:
Identity Protection
Parental Controls
Back Up
Tune-up
Networking
Total Performance
Online purchasing ease
Ease of installing and uninstalling
Quality of reporting
Total Ease of Use
56%

Similar Messages

  • Worn out software, useless crapware on a brand new HP Envy laptop

    I purchased an HP Envy last week. Brand new - i7, 8GB ram, 1TB disk. Screaming machine. Crammed with crap. And I got it from BestBuy.
    My primary purpose in buying my laptop was specifically Cyberlink PowerDirector, which came with the machine via Cyberlink Multimedia Suite. Nice. Except that the suite - and all of the products inside it including PowerDirector - is two releases old. It came with PD v10, and the current release is v12.
    You disabled Windows Defender, then installed McAfee Anti virus software, and then advertised that the system came with McAfee. McAfee requires an annual subscription, with the first year free (offered by McAfee, not BestBuy). So it's not exactly "free". Shame on you. It is not HP's policy to do this, says HP tech support, it was BestBuy's policy. In fact, HP does not recommend, nor support, McAfee or Norton (another common after-market add-in).
    Adding insult to injury, my purchase ALSO included a "free" anti-virus software, offered by the reseller, one of three that I could choose between WebRoot, McAfee, and TrendMicro. Of course, it's not really free again: I have to purchase a subscription. But I now have THREE anti-virus applications.
    Next, there were two copies of CyberLink YouCam. One is called "YouCam", the other is "YouCam 5". They are both from CyberLink. They are the same application, except that one is older version than the other, and neither are the latest copies.
    Next, there are several multimedia players - Windows Media player, Cyberlink, and sMedio. Really: how many do I need?
    You did the same with photo viewers and mangers: Windows Photo Gallery, Picture Gallery, and arguably Windows File Explorer.
    Then you did it again with music players: Windows Media Player, XBox, HP Connected Music.
    Then you did it again with file sharing: Box, SkyDrive, HP Connected Drive.
    And you did it again with video editors: Movie Maker and Cyberlink.
    And again with messenger/chat software: Skype and Pinger.
    What's more - you didn't provide any documentation for any of the software you crammed onto the system.
    Although I am happy with my laptop and accessories, you have significantly cheapened it's value, as I now have to spend a great deal of time figuring out which are needed Windows components, which is crapware, and which is duplicated junk.
    When I got it home, I took it out for a spin, and discovered the aforementioned oddities. I brought the problems to the attention of BestBuy (corporate HQ, it turned out), who referred me back to the store manager, who referred me to their GeekSquad, who never - 2 weeks later - responded back.
    At the same time, I contacted HP tech support, who confided in me that they have no knowledge of how this software got installed, who installed it, or who to go to for support. They don't even recommend using some of the software that came instlled (eg, McAfee).
    Nice. So HP is blaming BB. So I personally went into BB with my rant, and spoke with a Geek, who walked me through a series of steps. Honestly, it was nice being talked to like a child, for it made me realize how the process worked.
    "Did you order a custom machine?" "No."
    "Was the box opened before you opened it?" "No."
    "Was there a packing slip on the box?" "Yes. It indicates it came from an HP shipping center."
    "So, you got an unopened box from HP, and you want to know where/when/how we installed that software?" "Uh, well..."
    Nice. Now I have HP blaming BestBuy, and BestBuy blaming HP. However, BB seemed to be playing the role of tactful diplomat: Geek suggested the possibility that Microsoft coerced HP into installing the duplicate/crapware/old software.
    I'm not buying it: I came from HP's factory, and much of the duplicate stuff is from HP which overlaps MS applications. And why would MS induce anyone to disable Windows Defender so that a competing product can be used, or, why would MS induce anyone to include PowerDirector on top of MovieMaker?
    So, HP, I challenge you to explain why my new machine contains old/duplicate/crapware.  Did BB put you up to the specs?  Did MS put you up to the specs?

    If it makes you feel any better, I ordered my HP Envy 17-j184nr directly from HP and it came with all of the same crap installed, and I've spend hours trying to get everything cleaned up so it's actually useable.

  • Why is adobe requiring installation of McAfee software with latest updates?

    I have received my normal notices of update for Adobe acrobat.  However, during installation it tells me that it is also installing McAfee antivirus software.  I do not want any McAfee program on my computer, ever!  There is no indication until installation is underway that you are requiring this install, no way to deselect it, and frankly, McAfee is a pain to remove from any computer, and does not play well with industry specific software I am required to use.  WHAT THE *#))!_ IS Adobe playing at here?

    If you have Acrobat, rather than the free Adobe Reader, there is no offer of Macafee, so far as I know; you've been scammed.
    If you have the free Reader you can turn it off with an option like this:
    but if you didn't get that I strongly suspect a scam. There are a lot of fake Reader updates out there and I'd be more worried about the things it didn't mention...

  • Update firefox appears on screeen, requires disabling McAfee and Real Player, which I do not trust

    A message appears on my screen when I open Firefox that an update to 5.0 is available. When I then asked for the update, I got the message that myvirus protection McAfee and Real Plyer had to be disabled. I do not trust this message, for all I know there is some hoax. Why would a brouwser update need the virus protection disabled?

    You can find the links to download the Flash plugin for Windows at the bottom of this page:<br />
    Adobe - Common Flash Player download and installation issues (Windows): http://www.adobe.com/products/flashplayer/support/index.html
    Go to: 3. Download Adobe Flash Player

  • Another "Sorry, a serious error has occurred that requires Adobe Premiere Elements to shut down. We will attempt to save your current project."

    When I try an open the original project or a copy of it I get this message.
    "Sorry, a serious error has occurred that requires Adobe Premiere Elements to shut down. We will attempt to save your current project."
    I have tried to create a new project and get the same message.
    I have tried uninstalling and reinstalling the program a few times.
    The last time I worked on the project I had no issues.
    Any suggestions?

    Hi
    a. Open Premiere Elements 9.0/9.0.1 - Yes, I get the welcome screen (v9.0).  I can choose open project, and choose my project.  The program will open and show that it is loading the project with the scroll line will show all the way to 100% and will stay there.  Sometimes I get the "Sorry" message and sometimes the loading project window just goes away and nothing is loaded and the program stays on the clock until I close it.
    b. You can find the Adobe Premiere Elements Prefs file and deletion of it makes no difference to your issue. - Made no difference
    c. Have you deleted the whole 9.0 Folder in which the Adobe Premiere Elements Prefs file exists? If not, please do so. - Done, made no difference
    1. Does the problem exist with and without the antivirus and firewall(s) disabled? - Running McAfee Total Access Protection.  Turned off firewall and anti virus. It works.  As a test I left the anti virus off and tried loading project with and with out the firewall turned on.  The project loaded each time.  I then tested the firewall on, with and with out antivirus.  Antivirus off - project loads each time.  Antivirus on - doesn't load and program stays on clock.
    I will continue to experiment with it and see what happens.  The last time I used it I was running a different McAfee product than no.  So it seems to work with the Firewall on and the Antivirus off.

  • Premiere Elements 7, Sorry, a serious error has occurred  that requires Adobe Premiere Elements to..

    Hi, my software just recently started giving me the folowing error and it does not work (start):
    Sorry, a serious error has occured that requires Adone Premiere Elements to shut down. We will attempt to save your current project.
    I had tried everything, even uninstalling and reinstalling the program and still it does not work. Does anybody have this issue?
    Do you know how to fix it?

    I found the root casue of the problem. I just turn OFF the McAfee antivirun software and the Premiere Elements 7 works now. 
    I realized that McAfee updated the version on April 20 and i think this version has a problem with the Adobe Premiere Elements programm.

  • IPod touch 3G - activation required, will not sync properly, freezes up windows 7

    Hi,
    I am having a lot of trouble with my iPod touch 3G.
         I had not synced my iPhone 4 and my iPod touch for about a month as I was re-inputting my music into iTunes - I didn't want to sync them when not all the music I wanted would be synced onto them. Prior to syncing the devices, one day my iPod randomly displayed the "activation required" notification and the "connect to iTunes" screen. Neither my iPod nor my iPhone is jail broken, so this cannot be the cause of the deactivation. All I use my iPod for is plugging into my stereo system.
         Regardless, I had finally managed to sort through all my music and had managed to sync my iPhone with no hitches. However, I ran into various issues with the iPod. A pop-up in iTunes said that it detect the device but could read it and that I would need to restore my iPod. So I did so (restored to the back-up). However, not even a third of the way into the restore everything just seemed to stop. My screen went black with only the mouse flickering. I restarted my computer and tried restoring it again (again to the back-up). It got further this time and actually managed to sync some songs (around 70 out of 850). However, a pop-up appeared saying that iTunes could not write from the song or disk. So I unplugged my iPod and plugged it back in and it immediately slowed down my computer. Chrome would not respond, Shockwave crashed, iTunes would not respond, etc.
         Anyways, over the past couple days I have tried restoring the iPod (to factory settings) and that seems to have worked. I no longer have the constant "activation required" notification. iTunes seems to be having trouble syncing though. It will get a couple more songs synched and then display another pop-up saying that it could not write from the song files and then the synching process just gets stuck. The iPod no longer displays the synching icon, but iTunes remains stuck on "finishing sync".
    (The problem cannot be with the songs as they sync perfectly fine to my iPhone).
         On my iPod it shows all the songs which are/should be synched onto it. The synched songs appear in black (like normal) however, the majority of my songs are in a light grey and cannot be selected or played (basically it has the information about the song, but not the actual file itself). I can also use Wi-Fi or Bluetooth. They are both greyed-out and say "No Wi-Fi" or "Unavailable" respectively.
         Just as a note, I am on Windows 7 and have McAfee Antivirus Plus. I know that some people have some issues due to the firewall but I unsure as to how this could be the cause when my iPhone syncs perfectly well under the same conditions. I have iTunes 10.7.0.21 and my iPod is running on 5.1.1. If you need any additional information please ask!
    If someone could please help, I would be extremely grateful! I'm at my wits end.
    Thanks!

    See if disabling the antivirus and firewall resolves the problem.

  • Itunes won't open after McAfee update

    I have always had a problem opening itunes unless I disabled McAfee. Since the new McAfee update I cannot disable it or open itunes. After clicking on my itunes icon the computer freezes up and I have to manually turn the whole thing off and turn it on manually. Help!

    hello Nevada!
    After installing the latest itunes update, itunes
    won't open at all. I click on it and it just won't
    open.
    are you getting an error message? if so, what does it
    say?
    or are you getting no error messages whatsoever? if
    so, could you let us know the results of the
    following observations?
    reboot your PC. open Task Manager to the Processes
    Tab. now try to launch itunes again.
    does an itunes.exe process appear in Task Manager? if
    so, does it persist in there, or does it disappear
    after a few seconds?
    love, b
    b noir - i have been following your advice and i want to thank you for taking your time to try and solve these problems for ipod users.
    i have been following this message board each day for the past week - ever since my iTunes stopped working. i have not yet seen anyone who is receiving the same error message as myself.
    like most others, i downloaded the recent update for iTunes - since then, iTunes will not open. i have tried most of the other proposed solutions to no avail, such as downloading a stand-alone version of quicktime, making sure my msconfig start-up has the correct check marks, etc.
    the iTunes set-up completes with no problem - i have tried installing by saving the file to my hard drive and then running and also by running the program straight from the download window. same results.
    once i go to open iTunes, i receive the following error message: "iTunes has encountered a problem and needs to close. We are sorry for the inconvenience. if you were in the middle of something, the information you were working on might be lost. Please tell Microsoft about this problem." Then I click "Send Error Report" just hoping I will receive a required update to make this work.
    i was wondering if you could attempt to help me resolve this issue? i have my music saved to my external hard drive, so i am in no danger of losing my music. however, i need to open iTunes to update my iPod.
    thanks in advance for your help.
    rence

  • What kind of computer specs are required to smoothly run CS5 and future versions?

    Hello,
    I'm in search of a new laptop for running CS5. I checked the Adobe site for system specs (http://www.adobe.com/products/creativesuite/design/tech-specs.html) and they look ridiculous -- I stopped reading at 1 GB RAM...
    So my question is what should the system be like in order to smoothly run CS5 and the future versions CS6 and maybe even 7?   I read that there have been problems with i7 processors. Is it true?
    This far I have found:
    - nVidia Quadro graphics card (are there different versions of this? how much memory the card should have?)
    - 64bit Windows 7
    - memory? how much is sufficient? 6 GB? Memory type/speed specs?
    - processor? i5 or i7 or some else? (I'm in search of a laptop)
    - SSD HD drive or 7200 rpm HD?
    Our company laptop brand is Dell and I tried to look for a suitable model. However, very few had the nVidia Quadro graphics card
    Usage:
    The laptops are mostly used for website and DTP publishing, photo editing, drawing (=Dreamweaver, Photoshop, Illustrator, InDesign) but also for technical documentation (Framemaker). To some extent also video editing is done, but not yet very often. However, there are plans for this too. We also run MS SQL Express in some computers to run company-specific software. And of course the normal Office 2010 package. Virus scanner used is McAfee.

    Hello,
    I too agree with the points Mylenium stated. We have discussed about multiple computers (desktop & laptop), but people don't like the mess it would cause in terms of file syncronization etc. And it would also mean double effort for the IT to maintain all the software updates etc. in that many computers. We do work quite a lot in meetings etc. and work and collaborate directly with using these programs. So it would mean double work to first make notes in a meeting and then do work in another computer according to the notes. So the decision of using a good laptop is not random but thought.
    Our current laptops were selected in the CS2 era and they have survived well updates up to CS4. I haven't yet tested what CS5.5 would do in terms of performance and usability. The idea of changing and configuring a computer every year according to the latest models and software requirements does not sound good. That's why I stated the point that the computer to be selected should survive at least a few CS updates.
    SSDs. I don't see them pricely at all. We've changed SSDs to the current laptops and they increased their lifetime by at least two years. Incredible increase in speed! I really do recommend SSDs and would not even consider using mechanical drives anymore. In general I don't see the price of the laptop as problem -- it costs a lot more to configure and install the computer than the price of the computer. And if the computer is slow and/or needs to be changed often to a new model, it costs even more in lost employee performance.
    So conclusion up to now:
    - Win 7 64 bit
    - 8 GB memory
    - SSD drive
    - min i5 processor
    - Graphics card? Mobile Quadro NVS 3100M?
    So the current computer model could be:
    Dell E6410
    - Intel Core™ i7-640M
    - NVIDIA® NVS 3100M 512MB gDDR3
    - 14.1” WXGA+ LED Display (1440x900)
    - 8 GB dual channel DDR3 memory, 1 333 MHZ
    - 128 GB SSD

  • Can load the page with McAfee VirusScan Enterprise 8.5.0i turn on

    I need help on this, my problem is when I enable McAfee VirusScan Enterprise 8.5.0i's Access Protection on and Safari doesn't loads, but when I disable it, it load perfectly, so what i'm asking is, how can I surf the internet with Access Protection is enable for McAfee VirusScan Enterprise 8.5.0i, I hope that the full version of Safari 3 doesn't do this, and yes, my computer have met the requirements.
    Thanks for your support.
      Windows XP Pro   Custom Made
      Windows XP Pro   Custom Made

    Dominique,
    Thank you for the detailed problem description. Although you posted it some ten hours ago I have just now finished reading it.
    Form pages must be built so they can operate correctly when inline validation errors are displayed. The assumption (by the engine) is that session state (and package state) as it exists at the point the validations are performed is sufficient (and correct) to support the redisplay of the page without the need to fire on-load processes or computations. Session state or package state changes made by after-submit computations or after-submit/before computations/validations processes that prevent correct page behavior on the "validation redisplay" must be avoided.
    The condition types Inline Validation Errors Displayed/No Inline Validation Errors Displayed can be used for on-load events/controls (processes, computations, regions, items, ...) for which you need finer control over this behavior.
    Also, you can forgo the use of after-submit computations when the resulting alteration of session state would be inimical to proper "validation redisplay" behavior and use On Submit - After Computations and Validations processes instead.
    I hope I have understood your situation and that this answer adequately answers your questions.
    Scott

  • Query database McAfee Web Gateway

    Hi,
    Does anyone have example to query database (SQL) McAfee Web Gateway such as Top 10 website accessed, who access, etc.
    Thanks,
    Samuel
    This topic first appeared in the Spiceworks Community

    This has to do with your company and its regulations on wifi access. You can go into Safari and delete cookies and history. Otherwise, you may have to reset Network settings. That is found in Settings, General, Reset. This will reset all of your wifi settings and will require you to reenter all passwords. You have found what can happen when companies that provide wifi can control it. Generally their public wifi that you mention has reduced bandwith and thus slows down. I've seen this in a number of areas.

  • McAfee frequently warns me that Firefox is trying to accept incoming connections from the Internet and asks me whether or not I want to allow or block this - what is this all about?

    I cannot find any reference to this sort of activity by Firefox on your website. It is an '.exe' program location and McAfee warns me that "Hackers can use programs to steal your personal information or hijack your PC".
    Can you please confirm that these incoming connections are legitimate Firefox activity, and if so please explain what they are, why they are required by Firefox and why there appears to be no reference to this activity on your website. Many thanks.

    Hi Cor-el,
    Thanks for your response.
    No, unfortunately McAfee does not give any more detail as to the origin of these incoming connections - is there a way to find out from McAfee?
    I would have thought that Mozilla Firefox should have the answers, but I have been unable to find any reference to this issue on their website, Help section etc.
    Could it be the way my Options are configured? - although I've not changed them from the Default settings as far as I can remember.
    Cheers,
    GWhatsitworth.

  • Mac os x 10.5 , filevault and McAfee Virusscan mac 8.6

    some users at Ohio State University are having problems with this product set. with filevault turned on, after logging in to filevault, or giving their userid/password, and it starts up, they navigate to various files and all of a sudden the rolling beach ball comes up and their are more or less locked up. One user reports: I had file vault turned on, opened Mail, it commenced downloading new messages and
    as it was doing that I was browsing my folders of old email in the
    program. The beach ball came up, I could move the mail window but not
    use it. I couldn't get other programs to run either, this continued
    from roughly 12:45 pm until about 130pm.
    Mcafee cited KB report 3162553 (set on access scan to "on write"), which one user said alleviated the problem, but for others they still lock up. when filevault is not started the problem goes away.
    has anyone seen anything like this? I work with site licensing and so am reporting this on behalf of others.

    I am running a Mac OS X 10.5.8 and would like to simply purchase the I Work ( $ 79.00 one in disk form ) from the mac store and run it. 
    iWork costs $79 on the Apple online store. But it's a bit cheaper buying it from the Mac App Store (you have to buy them individually for about $20 each). The only catch is the Mac App Store is a program that comes with OS X 10.6, so you'd need to upgrade OS X on your Mac.
    Will my ( now older ) computer run it and will it recognize my pages documents that exist on my computer?
    Pages 4.1 requires OS X 10.6.6 or newer. So you'd need to update your Mac from OS X 10.5.8 to 10.6.6.
    Dale

  • HT1386 my windows 764 bit says this iphone can not be used the required software is not installed reinstall 64 bit version which i already have

    this i phone cannot be used please reinstall 64 bit version
    which i have allready i have reinstalled i tunes 6 times and it still does not sync or even recognice or connect my device

    smittycdm wrote:
    Did you turn off all Windows & other pc-related firewalls, virus and "real-time scanning"?  If necessary, d/l all software you need to the desktop and disconnect to prevent any visitors, if you are Level 6 you know all that.  But I've found all the problems w/pcs & iphones/itunes have been related to defender, mcafee, etc.  And your error message was one I used to get, the other was something about not being authorized even though I was signed in as administrator.  Hope that helps, it worked for me.
    Thanks for your input.
    iTunes has to contact Apple during the sync process, but iTunes can only sync the phone, if you can launch iTunes, which seems not to be the case, as "...the required software is not installed.."
    And, even if I have reached level 6, please remember, that not everybody is used to phrases like "d/l" or "w/pcs", especially if your post can have more than 160 letters

  • Why can't McAfee Antivirus download onto OS X Yosemite, Mac Air?

    Hello, I am trying to download McAfee Antivirus on my 2008 Mac Air with OS X Yosemite and am repeatedly told antivirus is already installed.  McAfee Tech could not find any apps indicating such.  Any ideas appreciated.  I got a message from a medical institution saying my Mac had a virus so am of course concerned...Thank you!

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, afford any protection against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for