Virus/Spyware/Malware Protection

I'm still a new switcher and coming from the PC world, I faithfully ran all kinds of "protection" software all the time. It feels weird to not do that anymore. So, what do Mac users use? Anything? Are Macs really that safe from the deviant world?

The word is safer.
No virus in the wild has ever infected Apple OS X, but that does mean that we happy Apple users can't inadvertently pass on a Windows virus to a Windows user, for example via email. Nor does it mean that no virus capable of infecting the Mac OS will never appear.
To that end many of us are content to run ClamXav:
http://www.clamxav.com/
which is free and does the job.
As regards Trojans (a different kind of threat), whilst these have not been known to infect a user, they have been identified in laboratory conditions.
From MacWorld, January 10, 2008:
SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
http://www.securemac.com/
The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X. Called DNSChanger Trojan and also known as OSX.RSPlug.A Trojan Horse the software attacks users attempting to play a fake video file.
Upon attempting to play the video, the victim receives the following message:
“Quicktime Player is unable to play movie file.
Please click here to download new version of codec.”
Upon running the installer, the user's DNS records are modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's DNS records stay modified on a minute-by-minute basis.
SecureMac's DNSChanger Removal Tool allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.

Similar Messages

  • Is Virus/Spyware/Malware Software necessary?

    I am a recent Windows to Mac convert (I will be getting my MacBook TODAY!!:), and i've been trying to find out if it's necessary to run virus/spyware/malware protection on my MacBook. I have to admit, coming from Windows, the idea of NOT using anything kinda scares me...but like I said, i've always used Windows, so maybe i'm just conditioned to feel this way, lol. I also pay my bills online - are there security measures already built in to the Mac software that makes it safe to do without running additional protection software?
    Thanks for your help and being patient with this Mac newbie

    Mac OS X ≠ Windows. Discard your preconceptions...
    No, you don't need anti-virus software for Mac OS X. In general, anti-virus software does more harm (system slowdowns, incompatibilities) than good, since there aren't any viruses in the wild that affect Macs. No software can protect you from user error - if you download some software from an untrusted source (e.g. a torrent of pirated software), then provide your admin password to install it, well, that's a 'wetware' error...
    If you'll be running Windows (via Boot Camp or a virtualization solution) you'll certainly need it on the Windows side.
    Likewise, the Mac OS X browser (Safari) provides secure connections to secure websites, along with a private browsing option so cookies, passwords, etc., are not saved.

  • Do iPads need any type of virus or malware protection?

    do iPads need any type of virus or malware protection?

    No.  There are no viruses which can infect iPads, and there's no way to install malware (evil programs) on an iPad except by downloading it from the App Store.
    (Unless you jailbreak your iPad, of course.  Then all bets are off.)

  • What kind of virus and malware protection do I need for my new iMac?

    I am new to Apple computers, what virus or malware protection do I need?

    Agreed, please read Thomas's guide!
    As a general rule of thumb though, no additional software is needed for malware or virus protection.  Apple computers are incredibly secure, the best protection is running Software Update often and not downloading from illegal software from torrent sites. Other than that, OS X is incredibly secure and best left alone to run well. 

  • Virus And Malware Protection for my iMac Yosemite 10.10.1

    Hi,
    My iMac starting opening random websites and I installed a free copy of Avast to take of it but I want to buy the best one. I'm looking for Virus and Malware protection for the lastest Yosemite.
    Thanks!

    You installed adware along with something else you installed.
    Download and run Adware Medic.
    Avoid purchasing any type of AV software. All such software only slows down Macs (and PCs), and for the most part, are utterly useless.

  • What kind of virus or malware protection is recommended?

    I just got a new IMAC (home computor).  I called Apple support and they said Apple doesn't endorse or recomend any specific virus or malware for my Apple...  Any other users out there have any malware, spyware or anti virus app's they recomend to keep your PC virus free and running good?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Email Virus/Spyware/Malware

    Greetings,
    I am rather curious as to how things work nowadays. Is it possible to get a virus/trojan/spyware/malware simply by browsing through your Mail Inbox and going through emails without clicking on any links in the email or opening up attachments? Perhaps exeuctable code secretly hidden in the email message?
    I received a spam email from an online social network called Twoo which stated that I had a message waiting for me on the website. I didn't click on any links whatsoever, I just read the email. Afterwards, I deleted it and considered it as spam.
    Any thoughts would be much appreciated!
    Thanks!

    Most Mac users very quickly discover that AV software on a Mac is more of a problem then it claims it will solve. The majority of them are only able to discover Windows virus since that is all the is available at this time. To do that they use an inordinate amount os suystem resourse while search for nothing. They usually manage to corrupt files systems while doing that. They are also know to have false positive on file important to the system. So once they are quarrentined the Mac is dead. They do all of this great stuff if you install them. I personally prefer to go without them and avoid the problems they cause.

  • Virus/Spyware/Firewall Protection

    As a PC (Dell) user looking to switch to a MAC...can anyone recommend any good virus/firewall/spyware protection suites for the MAC OS, Tiger?
    I understand that the virus/spyware/hacker threat is lower for a MAC than a PC, but I always like to have extra protection if possible, better safe than sorry (especially if you are not a programmer).
    Thank you very much for your time, attention and recommendations.

    You're welcome.
    What type of Mac do you have - Desktop or Portable?
    If a Desktop, do you plan on using a direct Ethernet connection to your modem or do you plan on creating/using a wireless network?
    If wireless and you go with Apple's new Airport Extreme base station or the Airport Express which is very small and portable (I have both), these include a hardware firewall as do most other wired and wireless routers these days.
    A router is a go between - between your computer and your DSL or Cable modem.
    If a wired router (via an Ethernet port connection), the router is connected to the modem and your Mac is connected to the router. Most wired routers include several connections so you can have a number of computers connected to the router and sharing the internet connection at the same time. You can also create a computer network this way - sharing files, etc. between all computers that are connected to the router.
    A wireless router also connects to the modem but computers with a wireless card connect to the router wirelessly also sharing the same internet connection. You can also create a computer network this way. I have an external USB hard drive connected to my Apple Airport Extreme Base Station which any computer that is connected to my wireless network can access. I also have a USB printer connected so I can print wirelessly with my PowerBook from anywhere in the house. I use a Dell notebook running Windows XP at work that includes a wireless card so I can access my internet connection and print wirelessly from my Dell notebook when at home.
    So it depends on if you want a wired or wireless router and some are a combination of the two. I prefer using Apple's wireless routers (although a little more expensive than others) but I don't have to worry about router firmware updates from the manufacturer as is sometimes required when Apple releases OS X and Security updates.
    When checking and deciding on a router, just be sure the specifications include a firewall. This provides double the protection and a firewall backup of sorts. If the hardware firewall fails (which isn't likely but anything is possible) and you keep the built-in firewall included with OS X enabled, there is your backup.
    Best of luck to you!

  • Viruses/Spyware/Malware/Trojans etc. Protection

    I am new to Macs but am pretty tech savvy. Do I really need a virus scanner? Do I need spyware protection? I use ClamXav for virus scanning. But it seems pretty unsecure and not reliable. Are there any other free virus scanners/anti-spyware software? Also is the OS X firewall secure enough, I know that it doesn't stop outgoing connections? How do you deal with these problems? Do you use any protection? Thanks.
    iMac Core Duo/iPod Photo 30 gig/Windows Knowledge   Mac OS X (10.4.8)   17 inch

    Hi.
    I'm surprised that you find ClamXav "…pretty unsecure and not reliable". It is the usual recommendation for free virus scanning on these boards. In what way do you find it so? Has it failed to pick up a Mac virus that you know is on your system? Unlikely as there are no true Mac viruses 'in the wild'.
    The OS X firewall is generally considered to be 'industry strength' but can be fine tuned with tools such as Snort in conjunction with Henwen, or Flying Buttress.
    As regards outgoing connections, Little Snitch is a lovely little shareware application. The usual comment on Little Snitch is that it does one thing and does it well.
    You might like to take a look at Dr Smoke's Detecting and avoiding malware and spyware, &/or, if you've got half a day to spare, put 'virus' into the search box over there------->>>>
    Reams of comments have been posted and I'm not going to reopen the argument now as it's all been said before, but just so you know which side of the camp I'm on, I use no AV software. I have the Mac and router FWs on, I use Little Snitch and common sense.
    Have fun,
    Adrian

  • How do I protect my iPad from viruses, spyware, malware etc

    Does apple require virus protection

    You don't need antivirus as long as you don't Jailbreak your iPad.
    http://support.apple.com/kb/HT3743

  • Viruses, spyware and Co.

    Hello -- I am a happy Mac user for the past 5 years. And never have had any problems that I know of with viruses, spyware, malware and this whole gamut of invaders which I battled constantly on my old Windows based PC.
    BUT..... I was interested if there have been any changes in this realm, i.e. is there any need to be checking for these problems? And if so, what are the recommended applications?

    +I also had the peculiar experience of receiving what appeared to be an email from my own gmail account several weeks ago with a very obscure message. That made me wonder about a virus but nothing untoward has happened since.+
    That simply means that someone was able to get into your Gmail account and address book there. I would have immediately changed my user name and password (make the password very difficult to guess) - you might consider doing that.
    +A friend recent got a warning about one of our emails from her MacAfee software, even though there were no attachments. Is there any way we can tell if this is the case?+
    I don't know of any way; I've been careful not to open anything unless I know the sender and I generally do not forward attachments. I have no idea why your friend would get a warning; but then I don't put much faith in MacAfee - it may have been a case of not recognizing a different format and therefore assuming it was bad.

  • Do I need to have any type of anti-virus or malware, spyware protection for my Macbook Pro?

    My Macbook is a year old. When I bought it, I was told by several people that I would not need any type of anti-virus software or anything to protect my computer because Mac did not get infected that often. However, I have had people today tell me that I do need protection for my computer. My Mac runs about as good as the day I got it, but I really don't want anything to happen to it. If I need to get an anti-virus, or malware/spyware software, what programs would y'all recomend? I am just looking for information. Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Virus/malware protection programs

    Does Apple recommend certain virus and malware security downloads?

    No. Currently none is needed because OS X provides built-in protection.
    Helpful Links Regarding Malware Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
              Mac OS X Snow Leopard and malware detection
              OS X Lion- Protect your Mac from malware
              OS X Mountain Lion- Protect your Mac from malware
              About file quarantine in OS X
    If you require anti-virus protection I recommend using VirusBarrier Express 1.1.6 or Dr.Web Light both from the App Store. They're both free, and since they're from the App Store, they won't destabilize the system. (Thank you to Thomas Reed for these recommendations.)

  • What about  anti-virus -spyware protection

    Is  Virus ,spyware protection aval. for i pad.

    AV software cannot run on the iPad even if it existed.
    iOS sandboxes apps, not allowing them to affect other apps or make system wide changes.
    All AV software could do was scan itself for malware or possibly your email.

  • Mac Anti-Virus/Malware Protection?

    I have a MacBook running Snow Leopard.
    I don't have any protection software running on my computer, but would like to be able to check my computer for spyware, malware, viruses, torjans, etc.
    Ideally, it would be something I could run on a daily basis, but it wouldn't be something that would constantly run in the background, as I do lots of image and audio processing, and need as much processing power freed up for this as possible.
    Any recommendations?
    What am I most at risk from?
    Price is important to me - at the moment, I'm unemployed, so I'd like to keep this as cheap as possible.
    Many thanks for considering this question. Appreciated.

    Thanks everyone, appreciated! :-D
    I've been using Macs for years and got into the habit of not needing any of this stuff - realised I ought to check in and initial research was showing more reports of people having trouble, so I thought it worth checking in here.
    Thanks for taking the time to respond.

Maybe you are looking for

  • Domain Users AD group disappearing from SharePoint security

    After applying SharePoint 2010 SP2 and the September 2014 cumulative update (KB 2883103) to our SP2010 farm, we've discovered the system is automatically removing the 'Domain Users' active directory group from SharePoint security.  It's not affecting

  • Forcing default printer from gpp cse computer based policy using item level tracking

    currently I have 1 policy for deploying printers and under the computer config/preferences/control panel/printers I have 2 printers set up the exact same way with item level targeting to apply it to 2 different pc's.  so 1 printer for each pc this al

  • Photoshop CC can't detect graphics processor

    Hi, I have an Hp pavilion desktop with a intel hd 4600. Whenever I open a psd I will get a dialog box explaining how I don't have sufficient vRAM. When I use the mouse to make brushstrokes, I can hear a squeaking coming from my computer. When I look

  • I wiped out Facebook on my mac lion...help!

    well my aunt sent me a game request on facebook.  I right clicked on it, hoping to block any future game requests.  I got a message, saying, "don't like what you see? ..then slide the bar until it looks good."...  so there was a sliding bar, ( like a

  • Windows 8 Pro Upgrade - Stuck at 0%

    Hello, Just yesterday I purchased the Windows 8 upgrade for a new machine I had just purchased. I let the Windows 8 Upgrade Assistant run for about 13 hours over night, knowing that the 2GB download would take some time on this network. Coming in thi