Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Safari 6.0.4 will not open sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx. Neither resetting Safari nor removing all cookies resolved the issue. Pop-ups now show despite being blocked in preferences.

Safari 6.0.4 will not open some sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx, supposedly because of too many redirects. It appears that Safari is cycling back and forth between the address as I entered it and the address of the redirect. Neither resetting Safari nor removing all cookies resolved the issue after various tries, despite these being the instructions to resolve the issue when I searched the Apple Support Communities. I am still able to open pages at www.seccionamarill.com.mx that I have saved in my Bookmarks, but I am not able to navigate the site to conduct new searches. I do not think that a university's library website should have issues with Safari. I think the problem is that the version of Safari that I have on my computer has been corrupted by malware or a virus.


Also, pop-ups now show in Safari despite still being blocked according to the preferences in Safari.


When I try to log in to Apple Support Communities via Safari, the website will not let me log in with my Apple ID, such that I can not post a question to ask for help.


I am able to use Google Chrome without issues to enter the websites that I named, and I have to use Google Chrome right now to be able to post this question in Apple Support Communities.


Updating my system via the Apple App Store has not helped.


Restarting my computer has not helped.


Updating my antivirus software (Trend Micro Titanium) and scanning my hard drive has not helped, because no problems have been detected.


The problem with being unable to open websites because of too many redirects began for the first time on Saturday, May 4, 2013 after I had been searching for cake recipes at websites that included blogs. While I was looking for recipes, I noticed that pop-ups were suddenly appearing when I was at such sites. I clicked on the "x" at the corners of the pop-ups to close them.


I am concerned that I have inadvertently downloaded some sort of malware via the cooking blogs.


Thank you.

MacBook Pro, OS X Mountain Lion (10.8.3), Safari 6.0.4

Posted on May 5, 2013 3:40 PM

Reply
14 replies

May 5, 2013 3:49 PM in response to MalloryCynRd

When I first upgraded to Mountain Lion, I faced a similar problem and found that the cause of the issue was a security app I was recommended to download from my bank.


If you have Trusteer Rapport installed, it may be causing the issue. After uninstalling it, it solved the problem for me. The link was that Safari wouldn't open any pages beginning with https://


Just a thought.

May 6, 2013 8:34 PM in response to adrian-polglase

Thank you for your response. However, I do not think that the issues that you mentioned are the cause of my problems.


I am not having trouble entering secure websites. The websites where I am suddenly having trouble with too many redirects are http://www.lib.byu.edu (the library website for a major university) and www.seccionamarilla.com.mx (the website for the phone directory in Mexico, equivalent to the Yellow Pages in the United States). Neither website is https://.


The only secure website where I have noticed difficulties has been in Apple Support Communities, since I have to log-in and provide a password here. I am not able to log-in to Apple Support Communities through Safari. I have to use Google Chrome instead.


I have not entered the websites that I use for banking since late April, and Safari functioned fine up until Sat., May 4. I do not intend to log-in to such websites with Safari while I'm having the problems that I've described with Safari. My banks have not obligated me to download any programs.


I do not have issues with upgrades. I am using a MacBook Pro that I bought in Dec. 2012. My operating system is OS X version 10.8.3.

May 6, 2013 9:01 PM in response to Linc Davis

Dear Linc Davis,


The advice you are giving is worrisome to me. You might be completely right that the problem with Safari is due to Trend Micro Titanium, but I feel unsafe about implementing your advice without a little more explanation to understand why you think that it would work.


Trend Micro Titanium is not giving me problems with the websites that I mentioned when I access them via Google Chrome.


Also, I never had any problems with Safari in using Trend Micro Titanium as my antivirus software on my MacBook Pro between Jan. 2013 up to May 3, 2013. I accessed the www.seccionamarilla.com.mx website frequently in February and March 2013. Trend Micro Titanium never has caused issues with accessing Apple websites, like iTunes, via my Apple ID during that time period.


Why do you think that Trend Micro Titanium is the cause of my problems with Safari?


It may be that I have some sort of setting in my preferences for either Safari or Trend Micro Titanium or that Trend Micro Titanium updated itself in a way that is incompatible with Safari. I changed settings on Trend Micro Titanium towards the end of April because it had websites about the Kentucky Derby blocked as "gambling" websites, which I unblocked. On May 4 and since then, I've tried changing many settings on both Safari and Trend Micro Titanium to try to correct the problems with Safari.


My suspicion is that Safari has been corrupted somehow and that Trend Micro Titanium is not detecting the threat that affected Safari to correct the problem.


If I uninstall Trend Micro Titanium and this does turn out to fix Safari, do you advise against downloading and reinstalling Trend Micro Titanium again afterwards as my antivirus program?


I have thought about downloading and installing another antivirus program to see if doing so would detect and correct the problem with Safari. Is there a particular antivirus program that you recommend as being superior for Macs?


Some people have suggested that I install multiple antivirus programs on my computer. I have not done so because I am concerned about compatibility issues between multiple antivirus programs.


I thought that I could fix the problems with Safari by either reverting to a prior version of my system before whatever recent change began causing the problem, the way I used to do on my old Windows computer. I could not figure out how to do the equivalent via Time Machine on my Mac. I got a message saying that Time Machine could not delete Safari from my computer because it was part of my operating system. I didn't want to delete Safari, but just revert to a prior version of Safari. I have never tried using Time Machine in this manner before.


Another idea I had was to download and reinstall Safari, but I could not find the version of Safari that I have (6.0.4) available for download online.

May 6, 2013 9:11 PM in response to MalloryCynRd

The Trend Micro product is worthless and can do nothing but cause problems. You should remove it whether it's causing this problem or not. As long as it's installed, your system is unmaintainable. After you've removed it and rebooted, if you still have the problem, we can do further troubleshooting. I don't choose to be involved otherwise. If you prefer to keep using the product, refer to its developer for support.


1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.

OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.

2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.

The following caveats apply to XProtect:

  • It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
  • It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated " Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)

Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:

  • It can easily be disabled or overridden by the user.
  • A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.

4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.


5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.

That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?

  • Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
  • A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
  • Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
  • Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
  • Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
  • Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
  • Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
6. Java on the Web ( not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.

Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.

Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable itnot JavaScript — in your browsers.

Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.

Why shouldn't you use commercial "anti-virus" products?
  • Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
  • In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
  • By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.

8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.

ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.

A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:

♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe

ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.

9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.

10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

May 6, 2013 9:55 PM in response to Linc Davis

Thank you very much for your response. This is a lot of new information for me to think about, but this seems like it should be very helpful. With the other demands on my time, I'm going to need a couple of days to read and understand everything that you are advising me to do before I can respond to you regarding whether or not the solution that you suggest has worked. Again, I thank you very much for the detail of explanation in your reply.

May 6, 2013 11:45 PM in response to MalloryCynRd

MalloryCynRd wrote:


Safari 6.0.4 will not open some sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx, supposedly because of too many redirects. It appears that Safari is cycling back and forth between the address as I entered it and the address of the redirect.

Add this to your reading list: Eliminating browser redirects and advertsements. Then give us a list of all the extensions you have installed in Safari Preferences->Extensions.

Oct 3, 2013 9:36 AM in response to MalloryCynRd

This issue is NOT restricted to Safari 6.0.4 or 6.0.5, nor is it restricted to Lion or Mountain Lion. Although my main computer is a MBP with Mountain Lion (10.8.5) and Safari 6.05, I also have an installation of Snow Leopard (10.6.8) with Safari 5.1.9. It was on this installation that I first started experiencing the numerous Safari crashes and pages that would not load properly (or completely). The crashes were not limited to Safari, though that app had more issues than any other.


On numerous occasions, I could not even load Apple's own website. Occasionally, none of the Apple home page menus will function at all until I close down Safari and use Firefox (or something else). Eventually, I begin testing other browsers, when I came to a page that wouldn't work as intended. In each case, I could access the problem page(s) with every other browser without difficulty.


I first started seeing these issues with the installation of OS 10.6.8 and Safari 5.1.9. I figured it would eventually go away, but it did not. If anything, it got worse. And now that I've loaded OS 10.8.5 and Safari 6.05, it still persists. This doesn't happen with every site, of course. But when it does happen, it's restricted to the Safari browser.


And, per the suggestion to "turn off the firewall" to resolve the issue... first, this doesn't resolve it, and secondly, I would never recommend turning off security in order to overlook a bug.

Oct 3, 2013 10:31 AM in response to WebbWebs

WebbWebs wrote:


And, per the suggestion to "turn off the firewall" to resolve the issue... first, this doesn't resolve it, and secondly, I would never recommend turning off security in order to overlook a bug.

I would agree that turning off the firewall probably won't resolve your problem, but it does slow your access to the internet slightly, so as long as you are on a trusted network behind a router using a strong WPA2 password, there is no reason to have it turned on. It's there for use when you are out and about at Starbucks or the public library. See Do I need a firewall?.

Oct 3, 2013 10:50 AM in response to MadMacs0

Your point regarding the NEED for the filewall is well taken. The majority of laptop users, however, are fequently "out and about at Starbucks or the public library". I personally wouldn't want to have to remember to turn it on and off. In my particular circumstance, I am now more frequently "out and about" than not.


That being said, however, I did indeed TRY turning off the firewall momentarily, just to test the possiblity that this might have an effect, BEFORE I replied. (I had actually mentioned that in a previous post, but the moderators removed the entire post, for some odd reason.)

Oct 3, 2013 11:13 AM in response to WebbWebs

WebbWebs wrote:


I did indeed TRY turning off the firewall momentarily, just to test the possiblity that this might have an effect, BEFORE I replied. (I had actually mentioned that in a previous post, but the moderators removed the entire post, for some odd reason.)

Yes I saw the replies (more than one) before they were taken down and have no idea why they disappeared.


Hopefully you have another thread going to help you out with your situation as this one is several months old and probably not drawing wide attention right now.

Oct 3, 2013 11:20 AM in response to MadMacs0

Thanks for your input MadMacs0. While you have a good point about the thread being old, the problem is much older. As I indicated, it was an ongoing problem even with my Snow Leopard install. Unfortunately, nothing has been done to correct it. The solution is probably simple... I'll just stop trusting Safari and make another browser my default, like so many of my developer friends have already done.


Thanks again.

Safari 6.0.4 will not open sites that it previously opened without issues, such as www.lib.byu.edu and www.seccionamarilla.com.mx. Neither resetting Safari nor removing all cookies resolved the issue. Pop-ups now show despite being blocked in preferences.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.