Fitaap05 wrote:
None of the above... just your average guy with anxiety
Wipe the disk, reinstall, you'll be just fine, then set up two-factor authentication on everything you can, use a password manager, don't download anything you didn't go searching for, disable Office document macros, disable the automatically-open-safe-files setting in Safari, upgrade to current software versions, be skeptical about all mail links and mail attachments and particularly from folks you trust, encrypt everything, choose longer passwords, remove Flash and Java Web Start, etc.
All that is standard and typical advice, too. Yes, Flash has been deprecated for a while and Java Web Start is finally gone with Java 11, but there are still older installations of both around.
Quite unfortunately, what we're dealing with now is past what any of us can reasonably cope with and there've been spoofing efforts that have fooled very competent folks. Everybody is eventually going to get fooled, too. Mistakes happen. We all get tired and hungry and distracted, on occasion.
Plan for it.
So... have backups and preferably have some of those backups rotated off-site and have some depth to your backups, as the backups are your recovery path. Backups are the recovery path for other data-adverse cases, too. Encrypted too, and particularly if copies are going off-site.
FWIW... macOS does have a more advanced and much more complex replacement for the functions provided by BIOS, and that replacement is known as EFI, and there is security research going into EFI, and there've been issues found with EFI. And there've been macro malware and other malware efforts targeting macOS users, and there'll likely be more. Apple added EFI validity checks a while back—ponder why they added that, too—though EFI is not the only place that a software or hardware implant or an exploit can be located within a computer. Apple is doing a pretty good job of hardening Mac security with these EFI checks, System Integrity Protection, encryption, and the T2 hardware. But folks will still find and other folks will still pay for exploits. There are folks actively looking for and finding exploits within the add-on anti-malware tools, too. Most of us will never be the subject of any of these or similarly-expensive exploits, though.