Skip navigation

Safari 6.0.4 will not open sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx. Neither resetting Safari nor removing all cookies resolved the issue. Pop-ups now show despite being blocked in preferences.

5654 Views 14 Replies Latest reply: Dec 19, 2013 6:09 PM by NatureCure RSS Branched to a new discussion.
MalloryCynRd Calculating status...
Currently Being Moderated
May 5, 2013 3:40 PM

Safari 6.0.4 will not open some sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx, supposedly because of too many redirects. It appears that Safari is cycling back and forth between the address as I entered it and the address of the redirect. Neither resetting Safari nor removing all cookies resolved the issue after various tries, despite these being the instructions to resolve the issue when I searched the Apple Support Communities. I am still able to open pages at www.seccionamarill.com.mx that I have saved in my Bookmarks, but I am not able to navigate the site to conduct new searches. I do not think that a university's library website should have issues with Safari. I think the problem is that the version of Safari that I have on my computer has been corrupted by malware or a virus.

 

Also, pop-ups now show in Safari despite still being blocked according to the preferences in Safari.

 

When I try to log in to Apple Support Communities via Safari, the website will not let me log in with my Apple ID, such that I can not post a question to ask for help.

 

I am able to use Google Chrome without issues to enter the websites that I named, and I have to use Google Chrome right now to be able to post this question in Apple Support Communities.

 

Updating my system via the Apple App Store has not helped.

 

Restarting my computer has not helped.

 

Updating my antivirus software (Trend Micro Titanium) and scanning my hard drive has not helped, because no problems have been detected.

 

The problem with being unable to open websites because of too many redirects began for the first time on Saturday, May 4, 2013 after I had been searching for cake recipes at websites that included blogs. While I was looking for recipes, I noticed that pop-ups were suddenly appearing when I was at such sites. I clicked on the "x" at the corners of the pop-ups to close them.

 

I am concerned that I have inadvertently downloaded some sort of malware via the cooking blogs.

 

Thank you.

MacBook Pro, OS X Mountain Lion (10.8.3), Safari 6.0.4
  • adrian-polglase Level 1 Level 1 (0 points)

    When I first upgraded to Mountain Lion, I faced a similar problem and found that the cause of the issue was a security app I was recommended to download from my bank.

     

    If you have Trusteer Rapport installed, it may be causing the issue. After uninstalling it, it solved the problem for me. The link was that Safari wouldn't open any pages beginning with https://

     

    Just a thought.

  • Linc Davis Level 10 Level 10 (107,555 points)
  • Linc Davis Level 10 Level 10 (107,555 points)

    The Trend Micro product is worthless and can do nothing but cause problems. You should remove it whether it's causing this problem or not. As long as it's installed, your system is unmaintainable. After you've removed it and rebooted, if you still have the problem, we can do further troubleshooting. I don't choose to be involved otherwise. If you prefer to keep using the product, refer to its developer for support.

     

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
      
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.

    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
       
    The following caveats apply to XProtect:
    • It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    • It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
       
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    • It can easily be disabled or overridden by the user.
    • A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
    For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
           
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
     
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
        
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    • Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    • A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    • Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    • Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    • Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    • Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    • Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
      
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
       
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable itnot JavaScript — in your browsers.
       
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.

    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
      
    Why shouldn't you use commercial "anti-virus" products?
    • Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    • In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    • By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
        
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
        
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
      
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
       
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
        
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
      
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • MadMacs0 Level 4 Level 4 (3,320 points)

    MalloryCynRd wrote:

     

    Safari 6.0.4 will not open some sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx, supposedly because of too many redirects. It appears that Safari is cycling back and forth between the address as I entered it and the address of the redirect.

    Add this to your reading list: Eliminating browser redirects and advertsements. Then give us a list of all the extensions you have installed in Safari Preferences->Extensions.

  • inblues4u Calculating status...

    Check if your Firewall is turned on.

     

    Go to System Preferences->Security & Privacy->Firewall

     

    Turn off the firewall and it should be fine

  • WebbWebs Calculating status...

    This issue is NOT restricted to Safari 6.0.4 or 6.0.5, nor is it restricted to Lion or Mountain Lion. Although my main computer is a MBP with Mountain Lion (10.8.5) and Safari 6.05, I also have an installation of Snow Leopard (10.6.8) with Safari 5.1.9. It was on this installation that I first started experiencing the numerous Safari crashes and pages that would not load properly (or completely). The crashes were not limited to Safari, though that app had more issues than any other.

     

    On numerous occasions, I could not even load Apple's own website. Occasionally, none of the Apple home page menus will function at all until I close down Safari and use Firefox (or something else). Eventually, I begin testing other browsers, when I came to a page that wouldn't work as intended. In each case, I could access the problem page(s) with every other browser without difficulty.

     

    I first started seeing these issues with the installation of OS 10.6.8 and Safari 5.1.9. I figured it would eventually go away, but it did not. If anything, it got worse. And now that I've loaded OS 10.8.5 and Safari 6.05, it still persists. This doesn't happen with every site, of course. But when it does happen, it's restricted to the Safari browser.

     

    And, per the suggestion to "turn off the firewall" to resolve the issue... first, this doesn't resolve it, and secondly, I would never recommend turning off security in order to overlook a bug.

  • MadMacs0 Level 4 Level 4 (3,320 points)

    WebbWebs wrote:

     

    And, per the suggestion to "turn off the firewall" to resolve the issue... first, this doesn't resolve it, and secondly, I would never recommend turning off security in order to overlook a bug.

    I would agree that turning off the firewall probably won't resolve your problem, but it does slow your access to the internet slightly, so as long as you are on a trusted network behind a router using a strong WPA2 password, there is no reason to have it turned on. It's there for use when you are out and about at Starbucks or the public library. See Do I need a firewall?.

  • WebbWebs Level 1 Level 1 (5 points)

    Your point regarding the NEED for the filewall is well taken. The majority of laptop users, however, are fequently "out and about at Starbucks or the public library". I personally wouldn't want to have to remember to turn it on and off. In my particular circumstance, I am now more frequently "out and about" than not.

     

    That being said, however, I did indeed TRY turning off the firewall momentarily, just to test the possiblity that this might have an effect, BEFORE I replied. (I had actually mentioned that in a previous post, but the moderators removed the entire post, for some odd reason.)

  • MadMacs0 Level 4 Level 4 (3,320 points)

    WebbWebs wrote:

     

    I did indeed TRY turning off the firewall momentarily, just to test the possiblity that this might have an effect, BEFORE I replied. (I had actually mentioned that in a previous post, but the moderators removed the entire post, for some odd reason.)

    Yes I saw the replies (more than one) before they were taken down and have no idea why they disappeared.

     

    Hopefully you have another thread going to help you out with your situation as this one is several months old and probably not drawing wide attention right now.

  • WebbWebs Level 1 Level 1 (5 points)

    Thanks for your input MadMacs0. While you have a good point about the thread being old, the problem is much older. As I indicated, it was an ongoing problem even with my Snow Leopard install. Unfortunately, nothing has been done to correct it. The solution is probably simple... I'll just stop trusting Safari and make another browser my default, like so many of my developer friends have already done.

     

    Thanks again.

  • NatureCure Calculating status...

    Do you have AdBlock installed Mallory? Turning it off did the trick for me. Ironically it was Linc's speculation here that made me think about this after struggling with the issue for a week.

Actions

More Like This

  • Retrieving data ...

Bookmarked By (1)

Legend

  • This solved my question - 10 points
  • This helped me - 5 points
This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.