Is virus protection necessary?

Is Virus protection necessary?

Yes. Fortunately OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple. Ill-conceived third party "anti-virus" garbage products are the primary reason for Mac instability, crashes and related problems reported on this site.
A much better question is "how should I protect my Mac":
Never install any product that claims to "speed up", "clean up", "optimize", or "accelerate" your Mac. Without exception, they will do the opposite.
Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources. Illegally obtained software is almost certain to contain malware.
Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iTunes or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
Don’t install Java unless you are certain that you need it:
Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
Disable Java in Safari > Preferences > Security.
Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
Block browser popups: Safari menu > Preferences > Security > and check "Block popup windows":
Popup windows are useful and required for some websites, but popups have devolved to become a common means to deliver targeted advertising that you probably do not want.
Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
If you ever see a popup indicating it detected registry errors, that your Mac is infected with some ick, or that you won some prize, it is 100% fraudulent. Ignore it.
Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
The most serious threat to your data security is phishing. To date, most of these attempts have been pathetic and are easily recognized, but that is likely to change in the future as criminals become more clever.
OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

Similar Messages

  • Virus protection necessary for ipad?

    We just got an ipad and were wondering if it's necessary to have some sort of virus protection for it.  Anyone know?

    This may be something new - I visited a Tumblr about an hour ago (1030PM PST), and when I tried to access my own Tumblr site on both Safari and Chrome, it kept getting redirected to a **** site.  I tried googling my tumblr URL, and a redirect to a **** site kept coming up.  When I opened the AppStore on my iPad, it immediately went to some kind of gaming app, and wouldn't let me do anything else. 
    I wiped the iPad clean, and I'm restoring it now from my computer as I'm writing this post. 
    Anyone know of any security apps yet? 

  • Does running Sophos virus protection reduce battery life dramatically? Also, is virus protection necessary for my mac running Lion?

    Information on virus protection and battery life is much appreciated. Thank you.

    fotofill wrote:
    To repair permissions, which will probably help a lot...
    Applications-> Utilities -> Disk Utility -> select your hard drive name  Repair Disk Permissions  You might want to do this procedure weekly.
    That would be overkill. In earlier versions of Mac OS X, permissions did appear to become correupted quite easily, but no more. Yes, repairing permissions can fix problems once in a while, but it's not something to waste your time doing weekly if there are no symptoms. See Randy Singer's Macintosh OS X Routine Maintenance on this subject.
    I just got my first virus EVER. ClamXav is a free program to check for viruses.
    ClamXav will not find any viruses on your Mac unless they are for Windows or Unix platforms as there are none that we know about. There is malware for the Mac which can affect it if you allow it to by installing it. What was the name of this "virus"?

  • Virus protection necessary?

    Hi, what kind of virus protection is recommended?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Virus protection for iMac-Leopard

    There seems to be a divergence of opinion, in general, regarding the need for virus-protection software for Mac. ( I used Intego Internet Security with my previous machine- 15" Flat Screen with Tiger.)
    The local Apple Store regarding the subject would say neither yes nor no.
    (I only talked to a salesman, though.)
    If there is a technically well-informed reader of this message, would you kindly answer the questions: a), is virus protection necessary; and b), if it is, would Intego be the way to go - if not, what would you suggest?

    Another vote for ClamXav, a wonderful protection for Mac. mtatmc is 110% right. Antivirus/antimalware protection is not just thinking about yourself and your computer, it is about thinking about everybody's safety when browsing this internet. It's not just about infecting your own computer, but passing it over to your friends' computers, to your family members' computers etc. Of course, no one wants that to happen.
    Maybe there are not so many viruses/trojans in the wild like there are for PCs, but don't be fooled... it is not thanks to Unix nor because Unix is safer than anything else out there... Nothing is bullet-proof and everything can be broken. It is just because PCs are a lot more popular than Macs, and attackers found them a lot more interesting to attack. Things are changing though and we have to be careful about this. Macs are becoming popular more and more, by the day... and it is just a question when these nasties will hit us. There are already some nasty trojans for the Macs in the wild, and you don't want to take any chances.
    Besides ClamXav, there is avast! antivirus for Mac recently released. It is one of the best antiviruses out there, but it is not free... and the biggest problem, Mac version has some issues, some bugs that still need to be fixed. I am a long time avast! user on my PC, but on my Mac, I use ClamXav and I am not even sure if I will switch to anything else.
    Another little thing... download and install DNS changer removal tool, it is a must have.
    http://www.versiontracker.com/dyn/moreinfo/macosx/33696
    Cheers!

  • What is the best virus protection for a Mac?

    What is the best virus protection for a Mac?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it, when necessary, only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Is virus protection needed on my mac?

    It just dawned on me that I've been using the machine without even the first mention virus protection.
    I'm wondering if it is necessary or if it's standard when you buy a new Mac mini?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Best virus protection software?

    What is the best virus protection?
    I have had a handful of viruses over the years - i have always used the open source free ones, but I am curious to see what everyone here thinks...
    so what are your thoughts?
    KB

    At this time there have been no confirmed Mac OS X viruses (subject to the semantic debate about whether the iChat exploit is properly classified as a virus or a trojan horse and not counting the Word macro virus that can affect Office v.X or non-updated copies of Office 2004), very few trojans and no adware or spyware. I therefore do not feel that antivirus or antispyware software is necessary at this time. It's never wise to become complacent, though, so security precautions are not wasted. Such security precautions mostly are common sense: don't download and run files from sites you don't know, don't double-click on attachments in emails you aren't expecting and/or from people you don't know, and make sure you password your system and keep that password secure as well as not having your system available and unattended (which also is a precaution against theft). In addition, it's possible for someone to inadvertently forward a Windows virus or worm to a PC user though you'd have to do it manually and said Windows malware cannot infect the Mac.
    In addition, it's possible for someone to inadvertently forward a Windows virus to a PC user though you'd have to do it manually, and said Windows virus cannot infect the Mac.
    If you do decide you wish to run antivirus software, I think that the donationware clamXav should be more than enough provided you remember to scan your system from time to time.
    If you are running Windows on your system, either via BootCamp, Parallels Workstation or another solution, then that copy of Windows is subject to all the myriad exploits common to the Windows world, so you need to take full precautions, including running both antivirus and antispyware software.

  • I've been hearing in todays news about a virus that can affect mac computers.  When purchasing my Mac computer I was informed I didn't need virus protection.  What do you advise now?

    Currently my mac doesn't have additional virus protection software.  When purchasing my mac 4 years ago I was told it wasn't necessary because it was so rarely needed due to Mac's Encryption etc.  With today's news I hear that it possible the current virus or bug that is out there is aimed at Mac's especially.  What is the advice now?

    It's not a virus. It's just the latest scare tactic promulgated by popular media outlets to ensure the uninformed among us remain uninformed. The fact that you (or they) characterized it as a "virus" is proof of that, on its face.
    What is the advice now?
    If you are running a web server, apply the patch by downloading it from the GNU project archive. If you don't know what that is, how to obtain it, or how to apply it to your server, then you are not affected and there is nothing you need to do.
    Apple announced they are "working to quickly provide a software update for our advanced UNIX users."
    There are plenty of bad things that could happen to a system due to existing vulnerabilities, known or unknown. There is no reason for any more concern today than there has ever been. Bash has been included with OS X for years, perhaps since its inception, and the particular flaw that was just discovered may have existed for years prior to that.
    Similar vulnerabilities may also be discovered and exploited, now or in the future. The resulting effects, if there are any, cannot be accurately predicted.
    Until then:
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.

  • Virus protection software

    Hi. I probably should have asked this question months ago when I bought this computer, but after a discussion at work, realized that I should probably purchase and/or download some kind of virus protection. Any suggestions....for some reason, I thought something would come with my purchase of the iMac, but I think I was mistaken.
    Thanks in advance.

    Actually, it is not necessary to run anti-malware software on a Mac. I say malware instead of "virus" because there are no Mac OS X viruses. A "virus" is malicious software that installs and spreads without direct user action. All that Conficker stuff is harmless on Mac OS X.
    There are other types of malware, such as Trojans, that do exist for Mac OS X. This type works by tricking the user into being installed by pretending to be something else. The user must knowingly run the software and give authorization for it to be installed. Using common sense and not running software from an unknown or suspicious source is sufficient protection. Nothing can prevent you from running and installing software, if that was your intention.
    The one reason you may want to run anti-malware software on Mac OS X is if you exchange emails and files with people who use Windows. Any files and emails with malware may be harmless on your Mac, but it can cause problems to others if you forward it. There is a free program called ClamXav.
    http://www.clamxav.com/
    The best way to use such programs is to run it periodically to scan your Mac's hard drive. Basically, run it periodically and don't worry about malware the rest of the time.

  • How can I get virus protection for my Mac

    We have a Mac and were not aware that we needed to put virus protection on it (I know, rookie)! Someone said that we can get it through Apple at no charge? Any help would be appreciated!

    In essence, Mac OS X is less virus prone for a couple reasons:
    1. No root account enabled by default.
    2. No support for Windows .exe files.
    3. Software sharing system preferences when the firewall is turned on, keeps all ports closed by default.
    Running Windows on a Mac, the Windows environment is still as succeptable as ever.
    Sophos and ClamX AV offer inexpensive anti-virus solutions, but honestly, most anti-virus for the Mac offers unnecessary overhead and network traffic.   You are better off practicing safe computing, avoiding trojans, including:
    1. Not using peer2peer software, or opening torrents of any kind.   
    2. Do not download Mackeeper.  If you have, read this: https://discussions.apple.com/docs/DOC-3036
    3. Do not use any cache cleaning software other than the built-in browser cache cleaning.
    4. Do not run software update from a browser window, instead go direct to the distributer's website of the necessary patch.   Popup windows have masqueraded themselves as Flash and Java updates.
    The only place you should get those are http://www.adobe.com/ and http://www.java.com/
    5. Backup your data frequently, and before any update: https://discussions.apple.com/docs/DOC-1992
    6. Check for viruses on Microsoft office documents before opening them as attachments to the Office application, or use an Office program that doesn't support Microsoft's macros, unless you absolutely need someone's macros.  Neooffice, Openoffice, Google Docs, Zoho Docs, and Libreoffice don't support the macros, but support most everything else.
    7. Be wary of any .app suffixed attachments or .scpt suffix attachments.  .app is most commonly used for
    Apple applications, and .scpt are most commonly used for Applescript.
    8. Do not open attachments from the Finder, unless you verify the application that can read them can open them directly.   A .JPEG could in theory masquerade as an Applescript, but it won't behave as one if you tried to use Preview to open it, as Preview can open the real JPEGs as JPEGs.
    Normally it wouldn't be a problem, since Macs are still seen as the small minority of computers, and Windows is a far greater target.   Apple does not provide any anti-virus free of charge itself.

  • Virus protection for Mac?

    Hello everyone.  I have been using Symantec for quite awhile now and finally figured out that it was causing my system to crash on a pretty frequent basis (Kernel Panic). 
    Question - Is virus protection even necessary for a Mac?  And if so what do you recommend?
    Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements up to three layers of built-in protection specifically against malware, not counting features such as address space layout randomization that may also apply to other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. When you install the Apple-supplied Java runtime (but not the Oracle runtime), a third layer of protection is added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you start up. It seems to check for, and potentially remove, malware that may have evaded the other protections via a Java exploit (see below.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other inessential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it, when necessary, only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Virus Protection using Parallels?

    Please excuse me if I have posted this in the wrong area. I am brand new to the world of Mac. I will be running MS XP under Parallels on my new MacBook for a few applications that have no Mac alternatives. I have read quite a bit that virus protection is not really necessary using OS X; my question is this: Will running XP on Parallels make my Mac vulnerable to more viruses? If it makes a difference, this computer will be on a network that has both Mac and PC users. Thanks.

    Should you run AV software with Parallels? If you are running Windows in it, absolutely. When running WinXP in Parallels you are running Windows and are at risk for adware and malware.
    Is your Mac at risk due to this? It can be but it need not be, that depends on how you use Parallels. Parallels creates a disk image and runs the virtualized installation from that disk image. Think of a big yard with a fenced in section. The yard is your Mac drive and the fenced in section is your Windows installation in Parallels. Without a gate, nothing can get it or out.
    Note I said without a gate. Parallels has the option of letting Windows share Mac folders. This is a convenient way to share information between Mac and Windows and it constitutes a gate. I create websites using Mac tools but before uploading them, I need to verify that they look correct in MS Exploder 5, 6, and 7. So I share the WebSites folder I have my user directory with my Parallels WinXP installation allowing me to load my websites in my Windows browsers. That means Windows can read and write to that folder and constitutes a potential danger to my Mac installation.
    So, use anti-malware software with Parallels? Yes. Worry that it might cause trouble for your Mac? A little. BTW, many ISP's offer free WIndows software. Check yours out.

  • Virus protection for iPad?

    Is it necessary to purchase a virus protection program for my ipad2?

    Due to the nature of ios, there are no antivirus programs nor would they be able to work.
    Apps cannot access other apps due to a security feature called sand boxing.
    There are pc/Mac antivirus programs that claim to scan attached iOS devices but I have no idea what they are looking for.

  • Virus protection on imac?

    I have read several times that you should have virus protection on the imac.  I have not done that.  Is it important to do?

    Agree with Allan.
    There's really no benefit of having any virus s/w at this time. There are no known viruses in the wild for Mac, and when (note I say 'when' not 'if') there is, none of the current AV software will be able to detect it until after the fact.
    We may one day be in a situation where AV s/w is necessary but given Apple's fairly aggressive stance with the App Store and GateKeeper (coming to ML), I wouldn't bank on that being any day soon.
    As always, the best defence against malware is your own commonsense. Stick to tried and trusted sites, keep Java off or only on for sites that absolutely require it, and investigate any unsual behaviour you notice on your computer immediately (such as by posting on ASC for advice).
    If you really must install some AV s/w, use nothing other than the free ClamXav, which seems to cause less problems than other AV s/w (aside from costing your nothing).

Maybe you are looking for

  • Calendar items added on iPhone don't show in Outlook

    There are four different color calendars showing on my iPhone 3GS. The items I add from my work PC on my Outlook calendar are blue. The items I add to my calendar on the iPhone are red. The red items do not show on my Outlook calendar. I've tried sho

  • App size says one thing in it's info and another thing on the sync page.

    I'm trying to sync my new application to my ipod touch. on the store it says that the app is 576mb if I go to the apps section of itunes and right click and select "Get info" it says 576.5mb in the apps tab for the ipod touch it's size is 1.22gb I kn

  • Archived file in XI

    Hi I would like to know that is there any way in which we can decode or read the .tpz file which is created while importing any XI object. While importing or exporting XI objects from or into repository, we need to select a .tpz extension file. How t

  • Flash Pro CS6 crashes when creating symbol

    Okay...here's one I gotta share. I'm building some banner ads for a client. I open up Flash Pro CS6. I create a square on the stage. And when I right-mouse click on the drawing, choose Create Symbol...Flash completely locks up. I get that little Wind

  • (SOLVED) ssb conflict with wl

    There is tons of info about this but everyones solution is only a trade off for me. Module ssb is keeping wl from loading and I have no wireless.(bcm4328) If I rmmod ssb, then my wireless works but at the cost of my ethernet card.(bcm4401) The ethern