Well... No... It's not really anti-virus software. But I do not recommend and have never recommended that Malwarebytes Anti-Malware software be installed on current OS X systems.
Please read thoroughly all the documentation I posted in my last reply to the list. Cheers, Ronni Sent from Ronni's iPad4 > On 27 Sep 2015, at 4:46 pm, FW <whae...@iinet.net.au> wrote: > > Malwarebytes Anti-Malware is not really anti-virus software, is it Ronni ? > > Cheers > Walter > > *************************************************************************** > >> Begin forwarded message: >> >> From: Ronni Brown <ro...@mac.com> >> Subject: Re: Malwarebytes, anti-malware for Mac >> Date: 27 September 2015 13:18:50 GMT+8 >> To: WAMUG <wamug@wamug.org.au> >> Reply-To: wamug@wamug.org.au >> >> >>> On 27 Sep 2015, at 11:58 am, Graham Rabe <gra...@rabe.com.au> wrote: >>> >>> A week or two ago Peter Marks on ABC Breakfast with Fran Kelly advised >>> against installing any Apple virus protection software given that recent >>> security upgrades have made them largely redundant and they seem to cause >>> more problems than they claim to fix. >>> >>> Graham >>> >>> Sent from my iPad >> >> I agree! In my previous reply I only supplied the information about >> Malwarebytes anti-malware for Mac. >> >> Peter, Daniel & I have posted numerous times re: Do Macs need Anti-Virus >> programs. >> The short answer is NO. >> >> Below I quote from Linc Davis - Level 10 Apple Support Communities >> >> /Begin Quote from Linc Davis: >> Mac users often ask whether they should install "anti-virus" software. The >> answer usually given on ASC is "no." The answer is right, but it may give >> the wrong impression that there is no threat from what are loosely called >> "viruses." There is a threat, and you need to educate yourself about it. >> >> 1. This is a comment on what you should—and should not—do to protect >> yourself from malicious software ("malware") that circulates on the Internet >> and gets onto a computer as an unintended consequence of the user's actions. >> It does not apply to software, such as keystroke loggers, that may be >> installed deliberately by an intruder who has hands-on access to the >> computer, or who has been able to log in to it remotely. That threat is in a >> different category, and there's no easy way to defend against it. >> >> The comment is long because the issue is complex. The key points are in >> sections 5, 6, and 10. >> >> OS X now implements three layers of built-in protection specifically against >> malware, not counting runtime protections such as execute disable, >> sandboxing, system library randomization, and address space layout >> randomization that may also guard against other kinds of exploits. >> >> 2. All versions of OS X since 10.6.7 have been able to detect known Mac >> malware in downloaded files, and to block insecure web plugins. This feature >> is transparent to the user. Internally Apple calls it "XProtect." >> >> The malware recognition database used by XProtect is automatically updated; >> however, you shouldn't rely on it, because the attackers are always at least >> a day ahead of the defenders. >> >> The following caveats apply to XProtect: >> >> ☞ It can be bypassed by some third-party networking software, such as >> BitTorrent clients and Java applets. >> >> ☞ It only applies to software downloaded from the network. Software >> installed from a CD or other media is not checked. >> >> As new versions of OS X are released, it's not clear whether Apple will >> indefinitely continue to maintain the XProtect database of older versions >> such as 10.6. The security of obsolete system versions may eventually be >> degraded. Security updates to the code of obsolete systems will stop being >> released at some point, and that may leave them open to other kinds of >> attack besides malware. >> >> 3. Starting with OS X 10.7.5, there has been a second layer of built-in >> malware protection, designated "Gatekeeper" by Apple. By default, >> applications and Installer packages downloaded from the network will only >> run if they're digitally signed by a developer with a certificate issued by >> Apple. Software certified in this way hasn't necessarily been tested by >> Apple, but you can be reasonably sure that it hasn't been modified by anyone >> other than the developer. His identity is known to Apple, so he could be >> held legally responsible if he distributed malware. That may not mean much >> if the developer lives in a country with a weak legal system (see below.) >> >> Gatekeeper doesn't depend on a database of known malware. It has, however, >> the same limitations as XProtect, and in addition the following: >> >> ☞ It can easily be disabled or overridden by the user. >> >> ☞ A malware attacker could get control of a code-signing certificate under >> false pretenses, or could simply ignore the consequences of distributing >> codesigned malware. >> >> ☞ An App Store developer could find a way to bypass Apple's oversight, or >> the oversight could fail due to human error. >> >> Apple has so far failed to revoke the codesigning certificates of some known >> abusers, thereby diluting the value of Gatekeeper and the Developer ID >> program. These failures don't involve App Store products, however. >> >> For the reasons given, App Store products, and—to a lesser extent—other >> applications recognized by Gatekeeper as signed, are safer than others, but >> they can't be considered absolutely safe. "Sandboxed" applications may >> prompt for access to private data, such as your contacts, or for access to >> the network. Think before granting that access. Sandbox security is based on >> user input. Never click through any request for authorization without >> thinking. >> >> 4. Starting with OS X 10.8.3, a third layer of protection has been added: a >> "Malware Removal Tool" (MRT). MRT runs automatically in the background when >> you update the OS. It checks for, and removes, malware that may have evaded >> the other protections via a Java exploit (see below.) MRT also runs when you >> install or update the Apple-supplied Java runtime (but not the Oracle >> runtime.) Like XProtect, MRT is effective against known threats, but not >> against unknown ones. It notifies you if it finds malware, but otherwise >> there's no user interface to MRT. >> >> 5. The built-in security features of OS X reduce the risk of malware attack, >> but they are not, and never will be, complete protection. Malware is >> foremost a problem of human behaviour, and no technological fix alone is >> going to solve it. Trusting software to protect you will only make you more >> vulnerable. >> >> The best defense is always going to be your own intelligence. With the >> possible exception of Java exploits, all known malware circulating on the >> Internet that affects a fully-updated installation of OS X 10.6 or later >> takes the form of so-called "Trojan horses," which can only have an effect >> if the victim is duped into running them. The threat therefore amounts to a >> battle of wits between you and Internet criminals. If you're better informed >> than they think you are, you'll win. That means, in practice, that you >> always stay within a safe harbor of computing practices. How do you know >> when you're leaving the safe harbor? Below are some warning signs of danger. >> >> Software from an untrustworthy source >> >> ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a >> website that also distributes pirated music or movies. >> >> ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come >> directly from the developer’s website. Do not trust an alert from any >> website to update Flash, or your browser, or any other software. >> >> ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free >> applications that have been packaged in a superfluous "installer." >> >> ☞ The software is advertised by means of spam or intrusive web ads. Any ad, >> on any site, that includes a direct link to a download should be ignored. >> >> Software that is plainly illegal or does something illegal >> >> ☞ High-priced commercial software such as Photoshop is "cracked" or "free." >> >> ☞ An application helps you to infringe copyright, for instance by >> circumventing the copy protection on commercial software, or saving streamed >> media for reuse without permission. All "YouTube downloaders" are in this >> category, though not all are necessarily malicious. >> >> Conditional or unsolicited offers from strangers >> >> ☞ A telephone caller or a web page tells you that you have a “virus” and >> offers to help you remove it. (Some reputable websites did legitimately warn >> visitors who were infected with the "DNSChanger" malware. That exception to >> this rule no longer applies.) >> >> ☞ A web site offers free content such as video or music, but to use it you >> must install a “codec,” “plug-in,” "player," "downloader," "extractor," or >> “certificate” that comes from that same site, or an unknown one. >> >> ☞ You win a prize in a contest you never entered. >> >> ☞ Someone on a message board such as this one is eager to help you, but only >> if you download an application of his choosing. >> >> ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an >> airport, but is not provided by the management. >> >> ☞ Anything online that you would expect to pay for is "free." >> >> Unexpected events >> >> ☞ A file is downloaded automatically when you visit a web page, with no >> other action on your part. Delete any such file without opening it. >> >> ☞ You open what you think is a document and get an alert that it's "an >> application downloaded from the Internet." Click Cancel and delete the file. >> Even if you don't get the alert, you should still delete any file that isn't >> what you expected it to be. >> >> ☞ An application does something you don't expect, such as asking for >> permission to access your contacts, your location, or the Internet for no >> obvious reason. >> >> ☞ Software is attached to email that you didn't request, even if it comes >> (or seems to come) from someone you trust. >> >> I don't say that leaving the safe harbor just once will necessarily result >> in disaster, but making a habit of it will weaken your defenses against >> malware attack. Any of the above scenarios should, at the very least, make >> you uncomfortable. >> >> 6. Java on the Web (not to be confused with JavaScript, to which it's not >> related, despite the similarity of the names) is a weak point in the >> security of any system. Java is, among other things, a platform for running >> complex applications in a web page, on the client. That was always a bad >> idea, and Java's developers have proven themselves incapable of implementing >> it without also creating a portal for malware to enter. Past Java exploits >> are the closest thing there has ever been to a Windows-style virus affecting >> OS X. Merely loading a page with malicious Java content could be harmful. >> >> Fortunately, client-side Java on the Web is obsolete and mostly extinct. >> Only a few outmoded sites still use it. Try to hasten the process of >> extinction by avoiding those sites, if you have a choice. Forget about >> playing games or other non-essential uses of Java. >> >> Java is not included in OS X 10.7 and later. Discrete Java installers are >> distributed by Apple and by Oracle (the developer of Java.) Don't use either >> one unless you need it. Most people don't. If Java is installed, disable >> it—not JavaScript—in your browsers. >> >> Regardless of version, experience has shown that Java on the Web can't be >> trusted. If you must use a Java applet for a task on a specific site, enable >> Java only for that site in Safari. Never enable Java for a public website >> that carries third-party advertising. Use it only on well-known, >> login-protected, secure websites without ads. In Safari 6 or later, you'll >> see a lock icon in the left side of the address bar when visiting a secure >> site. >> >> Stay within the safe harbor, and you’ll be as safe from malware as you can >> practically be. The rest of this comment concerns what you should not do to >> protect yourself. >> >> 7. Never install any commercial "anti-virus" (AV) or "Internet security" >> products for the Mac, as they are all worse than useless. If you need to be >> able to detect Windows malware in your files, use one of the free security >> apps in the Mac App Store—nothing else. >> >> Why shouldn't you use commercial AV products? >> >> ☞ To recognize malware, the software depends on a database of known threats, >> which is always at least a day out of date. This technique is a proven >> failure, as a major AV software vendor has admitted. Most attacks are >> "zero-day"—that is, previously unknown. Recognition-based AV does not defend >> against such attacks, and the enterprise IT industry is coming to the >> realization that traditional AV software is worthless. >> >> ☞ Its design is predicated on the nonexistent threat that malware may be >> injected at any time, anywhere in the file system. Malware is downloaded >> from the network; it doesn't materialize from nowhere. In order to meet that >> nonexistent threat, commercial AV software modifies or duplicates low-level >> functions of the operating system, which is a waste of resources and a >> common cause of instability, bugs, and poor performance. >> >> ☞ By modifying the operating system, the software may also create weaknesses >> that could be exploited by malware attackers. >> >> ☞ Most importantly, a false sense of security is dangerous. >> >> 8. An AV product from the App Store, such as "ClamXav," has the same >> drawback as the commercial suites of being always out of date, but it does >> not inject low-level code into the operating system. That doesn't mean it's >> entirely harmless. It may report email messages that have "phishing" links >> in the body, or Windows malware in attachments, as infected files, and offer >> to delete or move them. Doing so will corrupt the Mail database. The >> messages should be deleted from within the Mail application. >> >> An AV app is not needed, and cannot be relied upon, for protection against >> OS X malware. It's useful, if at all, only for detecting Windows malware, >> and even for that use it's not really effective, because new Windows malware >> is emerging much faster than OS X malware. >> >> Windows malware can't harm you directly (unless, of course, you use >> Windows.) Just don't pass it on to anyone else. A malicious attachment in >> email is usually easy to recognize by the name alone. An actual example: >> >> London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe >> >> You don't need software to tell you that's a Windows trojan. Software may be >> able to tell you which trojan it is, but who cares? In practice, there's no >> reason to use recognition software unless an organizational policy requires >> it. Windows malware is so widespread that you should assume it's in every >> email attachment until proven otherwise. Nevertheless, ClamXav or a similar >> product from the App Store may serve a purpose if it satisfies an >> ill-informed network administrator who says you must run some kind of AV >> application. It's free and it won't handicap the system. >> >> The ClamXav developer won't try to "upsell" you to a paid version of the >> product. Other developers may do that. Don't be upsold. For one thing, you >> should not pay to protect Windows users from the consequences of their >> choice of computing platform. For another, a paid upgrade from a free app >> will probably have all the disadvantages mentioned in section 7. >> >> 9. It seems to be a common belief that the built-in Application Firewall >> acts as a barrier to infection, or prevents malware from functioning. It >> does neither. It blocks inbound connections to certain network services >> you're running, such as file sharing. It's disabled by default and you >> should leave it that way if you're behind a router on a private home or >> office network. Activate it only when you're on an untrusted network, for >> instance a public Wi-Fi hotspot, where you don't want to provide services. >> Disable any services you don't use in the Sharing preference pane. All are >> disabled by default. >> >> 10. As a Mac user, you don't have to live in fear that your computer may be >> infected every time you install software, read email, or visit a web page. >> But neither can you assume that you will always be safe from exploitation, >> no matter what you do. Navigating the Internet is like walking the streets >> of a big city. It's as safe or as dangerous as you choose to make it. The >> greatest harm done by security software is precisely its selling point: it >> makes people feel safe. They may then feel safe enough to take risks from >> which the software doesn't protect them. Nothing can lessen the need for >> safe computing practices. >> /End Quote from Linc Davis >> --------------------------------------------- >> Now, Apple Support and my added comments below: >> Are you running Mavericks OS X 10.9.5 or Yosemite OS X 10.10.x? >> >> Do Macs really need Anti-virus protection? >> >> OS X - It's built to keep your Mac safe >> <https://www.apple.com/au/osx/what-is/security.html> >> >> OS X Mavericks - Protect your Mac from malware >> <http://support.apple.com/kb/PH14365> >> >> OS X Mavericks - Protect your Mac >> <http://support.apple.com/kb/PH13730> >> >> About File Quarantine in OS X >> <http://support.apple.com/kb/HT3662> >> >> About Security of OS X Yosemite >> Tiny URL >> http://tinyurl.com/oueejqa >> >> OS X already includes everything it needs to protect itself from viruses and >> malware, and it's free. Apple recommends keeping your Mac updated with >> software updates from Apple. Refer to the links above, which apply equally >> to Mavericks as well as its predecessor. >> >> A much better question is "how should I protect my Mac": >> >> • Never install any product that claims to "speed up", "clean up", >> "optimize", or "accelerate" your Mac. Without exception, they will do the >> opposite. >> >> • Never install pirated or "cracked" software, software obtained from >> dubious websites, or other questionable sources. Illegally obtained software >> is almost certain to contain malware. >> >> • Don’t supply your password in response to a popup window requesting it, >> unless you know what it is and the reason your credentials are required. >> >> • Don’t open email attachments from email addresses that you do not >> recognize, or click links contained in an email: >> • Most of these are scams that direct you to fraudulent sites that attempt >> to convince you to disclose personal information. >> • Such "phishing" attempts are the 21st century equivalent of a social >> exploit that has existed since the dawn of civilization. Don’t fall for it. >> >> • Apple will never ask you to reveal personal information in an email. If >> you receive an unexpected email from Apple saying your account will be >> closed unless you take immediate action, just ignore it. If your iTunes or >> App Store account becomes disabled for valid reasons, you will know when you >> try to buy something or log in to this support site, and are unable to. >> >> • Don’t install browser extensions unless you understand their purpose. Go >> to the Safari menu > Preferences > Extensions. If you see any extensions >> that you do not recognize or understand, simply click the Uninstall button >> and they will be gone. >> >> • Don’t install Java unless you are certain that you need it: >> • Java, a non-Apple product, is a potential vector for malware. If you are >> required to use Java, be mindful of that possibility. >> • Disable Java in Safari > Preferences > Security. >> • Despite its name JavaScript is unrelated to Java. No malware can infect >> your Mac through JavaScript. It’s OK to leave it enabled. >> >> • Block browser popups: Safari menu > Preferences > Security > and check >> "Block popup windows": >> • Popup windows are useful and required for some websites, but popups have >> devolved to become a common means to deliver targeted advertising that you >> probably do not want. >> • Popups themselves cannot infect your Mac, but many contain resource-hungry >> code that will slow down Internet browsing. >> • If you ever see a popup indicating it detected registry errors, that your >> Mac is infected with some ick, or that you won some prize, it is 100% >> fraudulent. Ignore it. >> >> • Ignore hyperventilating popular media outlets that thrive by promoting >> fear and discord with entertainment products arrogantly presented as "news". >> Learn what real threats actually exist and how to arm yourself against them: >> • The most serious threat to your data security is phishing. To date, most >> of these attempts have been pathetic and are easily recognized, but that is >> likely to change in the future as criminals become more clever. >> >> • OS X viruses do not exist, but intentionally malicious or poorly written >> code, created by either nefarious or inept individuals, is nothing new. >> >> • Never install something without first knowing what it is, what it does, >> how it works, and how to get rid of it when you don’t want it any more. >> >> • If you elect to use "anti-virus" software, familiarise yourself with its >> limitations and potential to cause adverse effects, and apply the principle >> immediately preceding this one. >> • Most such utilities will only slow down and destabilise your Mac while >> they look for viruses that do not exist, conveying no benefit whatsoever - >> other than to make you "feel good" about security, when you should actually >> be exercising sound judgment, derived from accurate knowledge, based on >> verifiable facts. >> >> • Do install updates from Apple as they become available. No one knows more >> about Macs and how to protect them than the company that builds them. >> >> Summary: Use common sense and caution when you use your Mac, just like you >> would in any social context. There is no product, utility, or magic talisman >> that can protect you from all the evils of mankind." >> /End Quote >> >> Cheers, >> Ronni >> >> 13-inch MacBook Air (April 2014) >> 1.7GHz Dual-Core Intel Core i7, Turbo Boost to 3.3GHz >> 8GB 1600MHz LPDDR3 SDRAM >> 512GB PCIe-based Flash Storage >> >> OS X Yosemite 10.10.2
-- The WA Macintosh User Group Mailing List -- Archives - <http://www.wamug.org.au/mailinglist/archives.shtml> Guidelines - <http://www.wamug.org.au/mailinglist/guidelines.shtml> Settings & Unsubscribe - <http://lists.wamug.org.au/listinfo/wamug.org.au-wamug>