TMHahn

Q: Virus Protection, Fact vs. Myth

I have been told that I don't need anti-virus software on my Macbook Pro, iPad, or iPhone.

 

As I understand it, there is no way for an iPad or an iPhone to get a virus or malware.

 

I'm not concerned about my Macbook Pro getting "sick," but I am concerned that such viruses or malware may reside on my machine and leave it open to transmitting it to other PCs (not Macs). I put Norton Security on my MBP, and it did identify malicious files even though those files were not hurting my MBP.

 

Is it responsible to have something like Norton Security on my MBP running El Capitan so that I don't spread viruses and malware?

MacBook Pro with Retina display, OS X El Capitan (10.11.4)

Posted on May 4, 2016 12:54 PM

Close

Q: Virus Protection, Fact vs. Myth

  • All replies
  • Helpful answers

Previous Page 2
  • by K Shaffer,

    K Shaffer K Shaffer May 5, 2016 11:19 AM in response to komplikated
    Level 6 (14,567 points)
    Desktops
    May 5, 2016 11:19 AM in response to komplikated

    These other items are helpful, aren't malware or adware, + are free:

     

    • MalwareBytes for Mac (formerly AdwareMedic)

    https://www.malwarebytes.org/antimalware/mac/

     

    • Etrecheck (a tool that can help see what's going on in Mac)

    http://etrecheck.com/#about

     

    • Mac Tech Guides - malware, adware, performance:

    http://www.thesafemac.com/tech-guides/

     

    • Stop pop-up ads in Safari - Apple Support:

    https://support.apple.com/en-us/HT203987

     

    There are several things to try & do to help keep your systems healthy

    and to know how to directly address issues that may occur in your OS X

    without external applications would be an ideal. Some new users may

    not feel comfortable with command-line or unfamiliar access inside their

    computer or smart device systems; there is often a learning curve in life.

     

    Avoid third-party sources of recommended applications or utilities; be

    sure to make backups of your system so you can go back to a Time

    Machine version saved from before an issue occurs that you could

    use to restore from. Have more than one backup drive or device.

    Have offline nearby backups so you can restore where internet

    may be slow or non-existent; or for stand-alone configurations.

     

    Consider investing in additional externally enclosed storage drives;

    also learn how to create, use, and test fully bootable OS X clones.

     

    Following are two better known (commercial maker) clone utilities,

    both have older versions for use with earlier OS X system. You can

    also use Disk Utility (see how to use OS X Recovery + Time Machine.)

     

    • Super Duper for Mac:

    http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html

     

    • Carbon Copy Cloner:

    http://bombich.com/

     

    Additional light reading:

     

    • OS X: About OS X Recovery - Apple Support

     

    • Apple OS X and Time Machine Tips:

    http://pondini.org/OSX/Home.html

     

    In any event...

    Good luck & happy computing!

  • by JimmyCMPIT,

    JimmyCMPIT JimmyCMPIT May 5, 2016 12:10 PM in response to komplikated
    Level 6 (8,476 points)
    Mac OS X
    May 5, 2016 12:10 PM in response to komplikated

    I'm going to 2nd Malwarebytes for mac based on limited use of it for Mac but extensive use of it for Widows and excellent results.

    MWB for mac does not prevent malware, it detects it and remove it. Others may have dissenting opinions of the product and thats not only fine, it's the purpose of a forum. My own experience with it has been very positive.

  • by notcloudy,

    notcloudy notcloudy May 6, 2016 7:30 AM in response to TMHahn
    Level 4 (1,200 points)
    Desktops
    May 6, 2016 7:30 AM in response to TMHahn

    TMHahn wrote:

     

    I've had Norton installed since late February and it doesn't seem to slow down my computer at all. I'll look into Intego, but I already have Norton installed and paid for, so I'm reluctant to change. Full scans once a week have identified some malicious files since installing Norton and promptly deleted them. I'm a "happy clicker," meaning I sometimes click on things or download things without thinking at times. This is why I decided to install protection even though the chances of coming across a Mac virus is slim.

     

    Thank you for your input.

    Norton was developed for PC not Mac where as Intego is developed for the Mac with courtesy to keep looking for linux and windows malware.

     

    The safe mac is outdated - windows PC's were the target because the quantity of them at the time.

  • by notcloudy,

    notcloudy notcloudy May 6, 2016 7:33 AM in response to JimmyCMPIT
    Level 4 (1,200 points)
    Desktops
    May 6, 2016 7:33 AM in response to JimmyCMPIT

    JimmyCMPIT wrote:

     

    if someone with a PC does not have AV and the machine is on a network, take their computer away and give them an Abacus...

     

    ...then slap the **** out of them.

    As macs may be on the same network - than the mac needs to have malware protection - so they do not accidentally infect the rest of the devices on the network - or pass an infection on.

  • by JimmyCMPIT,

    JimmyCMPIT JimmyCMPIT May 6, 2016 8:07 AM in response to notcloudy
    Level 6 (8,476 points)
    Mac OS X
    May 6, 2016 8:07 AM in response to notcloudy

    here's a current list of malware for mac that sophos has not inflated to sell more crap ware


    2006: Leap: First virus for Mac OS X sent via iChat: Leap worked only on OS X Tiger. Are you running Tiger?

    2007:  BadBunny worm: Patched in 2007

    2008: MacSweeper: Poisoned TV website adverts:

    2009: Pirated versions of iWork and Adobe Photoshop CS4

    In the year 2009, a new Mac OS X Trojan affecting the dubious copies of iWork’09 and AdobePhotoshop CS4 started showing up on the peer-to-peer (P2P) file sharing networks.

    • iWork’09: The Trojanized copies were found on the PirateBay torrent site as ZIP file, when this file was unpacked it would give a proper Mac .pkg.file; the iWorkServices.pkg file would an install package for OSX/iWorkS-A malware. Once user installed the OSX/iWorkS-A it would create several files and triggered a process to botnet the Mac computers. (Botnet is a collection of comprised computers which have been infected with the malware that is in complete control of the attacker.)
    • Adobe Photoshop CS4: Similar to the iWork’09, experts further discovered a new variant of the Apple Mac iWorkS Trojan horse which was being distributed via a pirated version of AdobePhotoshop CS4 on the P2P sharing networks. It was further found that the Trojan was being distributed through pirated versions of commercial copyrighted software, hence if users were not downloading any software illegally from the BitTorrent sites then they were not at the risk of encountering the malware. The infected Macintosh users faced the risk of having their computers remotely controlled by the attacker and further used to by attackers to send spams, steal identities and for the purposes of spreading the malware.

    2010: Boonana: Spread via social networking sites:

    Boonana was a multi-platform Trojan Horse which was spread to computers via social networking sites such as Facebook. The malware was discovered by SecureMac in 2010.

    Here, users used to receive a link which used to be accompanied with a phrase: “Is this you in the video?” This was a trap for the curious users who used to click on the link and then the malicious software would get downloaded to the computer which in turn used to modify the system files, settings and other security mechanisms thus allowing the hackers to get an easy access to the content of the computer.

    A security firm, Intego, figured out that Boonana was not that scary as it was expected to be because it was infested with bugs and hence it could not operate at a level it was expected to be by its makers.

    2010: PremierOpinion: Spyware wrapped in free Mac apps and screen savers:

    In 2010, Intego warned the Mac users regarding the spyware which was being wrapped in some free Mac apps and screen savers. This happened before Apple introduced its safety apps on Mac App Store.

    In this case the free app contained a spyware which made it compulsory for the user to run through some “market research program” and in the meantime it would scan the files on user’s computer and also record the online activity of user and send all these information to some remote server.

    This particular piece of malware already existed since 2008 and it had infected several Windows user. However, it started attacking Mac users since 2010.

    2011: MacDefender : Posed as an antivirus software:

    MacDefender, a piece of malware, marked the beginning of an altogether new era in the history of Mac malware. The exquisite design of this malware actually succeeded in convincing the users to easily fall prey to the tricks of this malware.

    MacDefender posed as an antivirus software and user’s were required to click on a malicious link to get the software downloaded to their computer. Further, the software required user to type in their system password for the installation of this dubbed anti virus software.

    Once, unsuspecting users punched in their system password, the attackers could easily gain access to the victim’s Mac computer even without their knowledge. This malware was discovered in 2011 and then Apple had even circulated a series of OS X updates to address the issue of MacDefender.

    2012: Flashback Malware : Posed as an Adobe Flash Installer:

    In 2012, the Flashback Malware infected over 600,000 Mac users across the globe.

    The malware spread through a Java vulnerability and functioned as a botnet. Basically, the malware posed as an Adobe Flash Installer and thus fooled the unsuspecting users to download the fake malicious malware.

    Upon installation, the malware would start stealing the system data such as passwords and other sensitive credentials such as credit card information and even user’s online searches were redirected to malicious websites.

    A free online removal tool to disable the automatic execution of Java applets was released by Apple to combat the malicious malware. Later, experts also revealed that Oracle has already patched the Java vulnerability a couple of months before it actually hit the Mac; however Apple was not that quick and Mac users had to face this malware.

    2014: Mac.BackDoor.iWorm : OS X Botnet:

    Security researchers from Dr. Web had discovered this OS X botnet in 2014 and it has already infected more than 17,000 Mac users worldwide. Surprisingly, the infected Macs were able to communicate with the administrators of the malware via Reddit.com in an interval of about five minutes.

    2014: Wirelurker : Spread via pirated Mac Apps

    2014, witnessed the Wirelurker malware which existed for a short time. Mac users in China were the ones to be affected the most with this malware.

    The malware spread through pirated Mac apps. Actually it was found to be embedded in the third party applications found on the unofficial Mac App Stores.

    Experts found that the malware was able to hop from an infected computer to an iPhone through a USB cable and it was able to do so even in case the iPhone was not jailbroken.

    The third party app store which spread this malware was eventually shut down and three criminals responsible for the malware were arrested.

    The history of Mac malware clearly indicates that Mac computers and devices  are not fortified and Mac users definitely need to guard their devices with proper antivirus software. One more word of caution to all the Mac users would be that they should never download any pirated links and dubious software through any of the social networking sites.



    Your best defense against these right now, proven defense is keep the macs up-to-date with securities patches, most if not all of these threats are already extinguished by OS 10.11.

    also from the source of these attacks stay away from pirated software, the legitimate stuff does not appear to have any nefarious payload and the cost of the software audit's finding when you hit court would be a policy I had on my network before I resort to Anti Virus on a Mac.

  • by babowa,

    babowa babowa May 6, 2016 8:03 AM in response to TMHahn
    Level 7 (32,357 points)
    iPad
    May 6, 2016 8:03 AM in response to TMHahn

    FWIW, I have never gotten any virus or malware (and adware only once from MacKeeper which did render my Mac useless until I erased and cloned back from my clone), but then I do not have anything set to download anything automatically, nor do I have sharing or syncing enabled. I disabled top sites and actually quit all apps before letting it sleep. I did get a questionable attachment to an email from a (presumably) Windows user once, so I simply deleted that and emptied the trash. I also informed the sender that I do not open attachments unless I am told what they are in advance. I do not visit questionable sites, nor do I download anything that is offered for "free" if it costs money elsewhere. I pay for my software and only download from the app store or the developer's site (if I know them to be reliable). I also refrain from forwarding attachments.

     

    Personally, I find it more responsible (towards my Macs) not to install unnecessary third party apps and that includes AV software, as it will not protect me from something that doesn't exist yet. If I should ever get something, I'd rather install and run (once) ClamXAV.

Previous Page 2