Well... No... It's not really anti-virus software.
But I do not recommend and have never recommended that Malwarebytes 
Anti-Malware software be installed on current OS X systems.

Please read thoroughly all the documentation I posted in my last reply to the 
list.

Cheers,
Ronni
Sent from Ronni's iPad4


> On 27 Sep 2015, at 4:46 pm, FW <whae...@iinet.net.au> wrote:
> 
> Malwarebytes Anti-Malware is not really anti-virus software, is it Ronni ?
> 
> Cheers
> Walter
> 
> ***************************************************************************
> 
>> Begin forwarded message:
>> 
>> From: Ronni Brown <ro...@mac.com>
>> Subject: Re: Malwarebytes, anti-malware for Mac
>> Date: 27 September 2015 13:18:50 GMT+8
>> To: WAMUG <wamug@wamug.org.au>
>> Reply-To: wamug@wamug.org.au
>> 
>> 
>>> On 27 Sep 2015, at 11:58 am, Graham Rabe <gra...@rabe.com.au> wrote:
>>> 
>>> A week or two ago Peter Marks on ABC Breakfast with Fran Kelly advised 
>>> against installing any Apple virus protection software given that recent 
>>> security upgrades have made them largely redundant and they seem to cause 
>>> more problems than they claim to fix.  
>>> 
>>> Graham
>>> 
>>> Sent from my iPad
>> 
>> I agree! In my previous reply I only supplied the information about 
>> Malwarebytes anti-malware for Mac.
>> 
>> Peter, Daniel & I have posted numerous times re: Do Macs need Anti-Virus 
>> programs.
>> The short answer is NO.
>> 
>> Below I quote from Linc Davis - Level 10 Apple Support Communities
>> 
>> /Begin Quote from Linc Davis:
>> Mac users often ask whether they should install "anti-virus" software. The 
>> answer usually given on ASC is "no." The answer is right, but it may give 
>> the wrong impression that there is no threat from what are loosely called 
>> "viruses." There  is a threat, and you need to educate yourself about it.
>> 
>> 1. This is a comment on what you should—and should not—do to protect 
>> yourself from malicious software ("malware") that circulates on the Internet 
>> and gets onto a computer as an unintended consequence of the user's actions. 
>> It does not apply to software, such as keystroke loggers, that may be 
>> installed deliberately by an intruder who has hands-on access to the 
>> computer, or who has been able to log in to it remotely. That threat is in a 
>> different category, and there's no easy way to defend against it.
>> 
>> The comment is long because the issue is complex. The key points are in 
>> sections 5, 6, and 10.
>> 
>> OS X now implements three layers of built-in protection specifically against 
>> malware, not counting runtime protections such as execute disable, 
>> sandboxing, system library randomization, and address space layout 
>> randomization that may also guard against other kinds of exploits.
>> 
>> 2. All versions of OS X since 10.6.7 have been able to detect known Mac 
>> malware in downloaded files, and to block insecure web plugins. This feature 
>> is transparent to the user. Internally Apple calls it "XProtect."
>> 
>> The malware recognition database used by XProtect is automatically updated; 
>> however, you shouldn't rely on it, because the attackers are always at least 
>> a day ahead of the defenders.
>> 
>> The following caveats apply to XProtect:
>> 
>> ☞ It can be bypassed by some third-party networking software, such as 
>> BitTorrent clients and Java applets.
>> 
>> ☞ It only applies to software downloaded from the network. Software 
>> installed from a CD or other media is not checked.
>> 
>> As new versions of OS X are released, it's not clear whether Apple will 
>> indefinitely continue to maintain the XProtect database of older versions 
>> such as 10.6. The security of obsolete system versions may eventually be 
>> degraded. Security updates to the code of obsolete systems will stop being 
>> released at some point, and that may leave them open to other kinds of 
>> attack besides malware.
>> 
>> 3. Starting with OS X 10.7.5, there has been a second layer of built-in 
>> malware protection, designated "Gatekeeper" by Apple. By default, 
>> applications and Installer packages downloaded from the network will only 
>> run if they're digitally signed by a developer with a certificate issued by 
>> Apple. Software certified in this way hasn't necessarily been tested by 
>> Apple, but you can be reasonably sure that it hasn't been modified by anyone 
>> other than the developer. His identity is known to Apple, so he could be 
>> held legally responsible if he distributed malware. That may not mean much 
>> if the developer lives in a country with a weak legal system (see below.)
>> 
>> Gatekeeper doesn't depend on a database of known malware. It has, however, 
>> the same limitations as XProtect, and in addition the following:
>> 
>> ☞ It can easily be disabled or overridden by the user.
>> 
>> ☞ A malware attacker could get control of a code-signing certificate under 
>> false pretenses, or could simply ignore the consequences of distributing 
>> codesigned malware.
>> 
>> ☞ An App Store developer could find a way to bypass Apple's oversight, or 
>> the oversight could fail due to human error.
>> 
>> Apple has so far failed to revoke the codesigning certificates of some known 
>> abusers, thereby diluting the value of Gatekeeper and the Developer ID 
>> program. These failures don't involve App Store products, however.
>> 
>> For the reasons given, App Store products, and—to a lesser extent—other 
>> applications recognized by Gatekeeper as signed, are safer than others, but 
>> they can't be considered absolutely safe. "Sandboxed" applications may 
>> prompt for access to private data, such as your contacts, or for access to 
>> the network. Think before granting that access. Sandbox security is based on 
>> user input. Never click through any request for authorization without 
>> thinking.
>> 
>> 4. Starting with OS X 10.8.3, a third layer of protection has been added: a 
>> "Malware Removal Tool" (MRT). MRT runs automatically in the background when 
>> you update the OS. It checks for, and removes, malware that may have evaded 
>> the other protections via a Java exploit (see below.) MRT also runs when you 
>> install or update the Apple-supplied Java runtime (but not the Oracle 
>> runtime.) Like XProtect, MRT is effective against known threats, but not 
>> against unknown ones. It notifies you if it finds malware, but otherwise 
>> there's no user interface to MRT.
>> 
>> 5. The built-in security features of OS X reduce the risk of malware attack, 
>> but they are not, and never will be, complete protection. Malware is 
>> foremost a problem of human behaviour, and no technological fix alone is 
>> going to solve it. Trusting software to protect you will only make you more 
>> vulnerable.
>> 
>> The best defense is always going to be your own intelligence. With the 
>> possible exception of Java exploits, all known malware circulating on the 
>> Internet that affects a fully-updated installation of OS X 10.6 or later 
>> takes the form of so-called "Trojan horses," which can only have an effect 
>> if the victim is duped into running them. The threat therefore amounts to a 
>> battle of wits between you and Internet criminals. If you're better informed 
>> than they think you are, you'll win. That means, in practice, that you 
>> always stay within a safe harbor of computing practices. How do you know 
>> when you're leaving the safe harbor? Below are some warning signs of danger.
>> 
>> Software from an untrustworthy source
>> 
>> ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a 
>> website that also distributes pirated music or movies.
>> 
>> ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come 
>> directly from the developer’s website. Do not trust an alert from any 
>> website to update Flash, or your browser, or any other software.
>> 
>> ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free 
>> applications that have been packaged in a superfluous "installer."
>> 
>> ☞ The software is advertised by means of spam or intrusive web ads. Any ad, 
>> on any site, that includes a direct link to a download should be ignored.
>> 
>> Software that is plainly illegal or does something illegal
>> 
>> ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
>> 
>> ☞ An application helps you to infringe copyright, for instance by 
>> circumventing the copy protection on commercial software, or saving streamed 
>> media for reuse without permission. All "YouTube downloaders" are in this 
>> category, though not all are necessarily malicious.
>> 
>> Conditional or unsolicited offers from strangers
>> 
>> ☞ A telephone caller or a web page tells you that you have a “virus” and 
>> offers to help you remove it. (Some reputable websites did legitimately warn 
>> visitors who were infected with the "DNSChanger" malware. That exception to 
>> this rule no longer applies.)
>> 
>> ☞ A web site offers free content such as video or music, but to use it you 
>> must install a “codec,” “plug-in,” "player," "downloader," "extractor," or 
>> “certificate” that comes from that same site, or an unknown one.
>> 
>> ☞ You win a prize in a contest you never entered.
>> 
>> ☞ Someone on a message board such as this one is eager to help you, but only 
>> if you download an application of his choosing.
>> 
>> ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an 
>> airport, but is not provided by the management.
>> 
>> ☞ Anything online that you would expect to pay for is "free."
>> 
>> Unexpected events
>> 
>> ☞ A file is downloaded automatically when you visit a web page, with no 
>> other action on your part. Delete any such file without opening it.
>> 
>> ☞ You open what you think is a document and get an alert that it's "an 
>> application downloaded from the Internet." Click Cancel and delete the file. 
>> Even if you don't get the alert, you should still delete any file that isn't 
>> what you expected it to be.
>> 
>> ☞ An application does something you don't expect, such as asking for 
>> permission to access your contacts, your location, or the Internet for no 
>> obvious reason.
>> 
>> ☞ Software is attached to email that you didn't request, even if it comes 
>> (or seems to come) from someone you trust.
>> 
>> I don't say that leaving the safe harbor just once will necessarily result 
>> in disaster, but making a habit of it will weaken your defenses against 
>> malware attack. Any of the above scenarios should, at the very least, make 
>> you uncomfortable.
>> 
>> 6. Java on the Web (not to be confused with JavaScript, to which it's not 
>> related, despite the similarity of the names) is a weak point in the 
>> security of any system. Java is, among other things, a platform for running 
>> complex applications in a web page, on the client. That was always a bad 
>> idea, and Java's developers have proven themselves incapable of implementing 
>> it without also creating a portal for malware to enter. Past Java exploits 
>> are the closest thing there has ever been to a Windows-style virus affecting 
>> OS X. Merely loading a page with malicious Java content could be harmful.
>> 
>> Fortunately, client-side Java on the Web is obsolete and mostly extinct. 
>> Only a few outmoded sites still use it. Try to hasten the process of 
>> extinction by avoiding those sites, if you have a choice. Forget about 
>> playing games or other non-essential uses of Java.
>> 
>> Java is not included in OS X 10.7 and later. Discrete Java installers are 
>> distributed by Apple and by Oracle (the developer of Java.) Don't use either 
>> one unless you need it. Most people don't. If Java is installed, disable 
>> it—not JavaScript—in your browsers.
>> 
>> Regardless of version, experience has shown that Java on the Web can't be 
>> trusted. If you must use a Java applet for a task on a specific site, enable 
>> Java only for that site in Safari. Never enable Java for a public website 
>> that carries third-party advertising. Use it only on well-known, 
>> login-protected, secure websites without ads. In Safari 6 or later, you'll 
>> see a lock icon in the left side of the address bar when visiting a secure 
>> site.
>> 
>> Stay within the safe harbor, and you’ll be as safe from malware as you can 
>> practically be. The rest of this comment concerns what you should not do to 
>> protect yourself.
>> 
>> 7. Never install any commercial "anti-virus" (AV) or "Internet security" 
>> products for the Mac, as they are all worse than useless. If you need to be 
>> able to detect Windows malware in your files, use one of the free security 
>> apps in the Mac App Store—nothing else.
>> 
>> Why shouldn't you use commercial AV products?
>> 
>> ☞ To recognize malware, the software depends on a database of known threats, 
>> which is always at least a day out of date. This technique is a proven 
>> failure, as a major AV software vendor has admitted. Most attacks are 
>> "zero-day"—that is, previously unknown. Recognition-based AV does not defend 
>> against such attacks, and the enterprise IT industry is coming to the 
>> realization that traditional AV software is worthless.
>> 
>> ☞ Its design is predicated on the nonexistent threat that malware may be 
>> injected at any time, anywhere in the file system. Malware is downloaded 
>> from the network; it doesn't materialize from nowhere. In order to meet that 
>> nonexistent threat, commercial AV software modifies or duplicates low-level 
>> functions of the operating system, which is a waste of resources and a 
>> common cause of instability, bugs, and poor performance.
>> 
>> ☞ By modifying the operating system, the software may also create weaknesses 
>> that could be exploited by malware attackers.
>> 
>> ☞ Most importantly, a false sense of security is dangerous.
>> 
>> 8. An AV product from the App Store, such as "ClamXav," has the same 
>> drawback as the commercial suites of being always out of date, but it does 
>> not inject low-level code into the operating system. That doesn't mean it's 
>> entirely harmless. It may report email messages that have "phishing" links 
>> in the body, or Windows malware in attachments, as infected files, and offer 
>> to delete or move them. Doing so will corrupt the Mail database. The 
>> messages should be deleted from within the Mail application.
>> 
>> An AV app is not needed, and cannot be relied upon, for protection against 
>> OS X malware. It's useful, if at all, only for detecting Windows malware, 
>> and even for that use it's not really effective, because new Windows malware 
>> is emerging much faster than OS X malware.
>> 
>> Windows malware can't harm you directly (unless, of course, you use 
>> Windows.) Just don't pass it on to anyone else. A malicious attachment in 
>> email is usually easy to recognize by the name alone. An actual example:
>> 
>> London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
>> 
>> You don't need software to tell you that's a Windows trojan. Software may be 
>> able to tell you which trojan it is, but who cares? In practice, there's no 
>> reason to use recognition software unless an organizational policy requires 
>> it. Windows malware is so widespread that you should assume it's in every 
>> email attachment until proven otherwise. Nevertheless, ClamXav or a similar 
>> product from the App Store may serve a purpose if it satisfies an 
>> ill-informed network administrator who says you must run some kind of AV 
>> application. It's free and it won't handicap the system.
>> 
>> The ClamXav developer won't try to "upsell" you to a paid version of the 
>> product. Other developers may do that. Don't be upsold. For one thing, you 
>> should not pay to protect Windows users from the consequences of their 
>> choice of computing platform. For another, a paid upgrade from a free app 
>> will probably have all the disadvantages mentioned in section 7.
>> 
>> 9. It seems to be a common belief that the built-in Application Firewall 
>> acts as a barrier to infection, or prevents malware from functioning. It 
>> does neither. It blocks inbound connections to certain network services 
>> you're running, such as file sharing. It's disabled by default and you 
>> should leave it that way if you're behind a router on a private home or 
>> office network. Activate it only when you're on an untrusted network, for 
>> instance a public Wi-Fi hotspot, where you don't want to provide services. 
>> Disable any services you don't use in the Sharing preference pane. All are 
>> disabled by default.
>> 
>> 10. As a Mac user, you don't have to live in fear that your computer may be 
>> infected every time you install software, read email, or visit a web page. 
>> But neither can you assume that you will always be safe from exploitation, 
>> no matter what you do. Navigating the Internet is like walking the streets 
>> of a big city. It's as safe or as dangerous as you choose to make it. The 
>> greatest harm done by security software is precisely its selling point: it 
>> makes people feel safe. They may then feel safe enough to take risks from 
>> which the software doesn't protect them. Nothing can lessen the need for 
>> safe computing practices.
>> /End Quote from Linc Davis
>> ---------------------------------------------
>> Now, Apple Support and my  added comments below:
>> Are you running Mavericks OS X 10.9.5 or Yosemite OS X 10.10.x?
>> 
>> Do Macs really need Anti-virus protection?
>> 
>> OS X  - It's built to keep your Mac safe
>> <https://www.apple.com/au/osx/what-is/security.html>
>> 
>> OS X Mavericks - Protect your Mac from malware
>> <http://support.apple.com/kb/PH14365>
>> 
>> OS X Mavericks -  Protect your Mac
>> <http://support.apple.com/kb/PH13730>
>> 
>> About File Quarantine in OS X
>> <http://support.apple.com/kb/HT3662>
>> 
>> About Security of OS X Yosemite 
>> Tiny URL
>> http://tinyurl.com/oueejqa
>> 
>> OS X already includes everything it needs to protect itself from viruses and 
>> malware, and it's free. Apple recommends keeping your Mac updated with 
>> software updates from Apple. Refer to the links above, which apply equally 
>> to Mavericks as well as its predecessor.
>>  
>> A much better question is "how should I protect my Mac":
>>  
>> • Never install any product that claims to "speed up", "clean up", 
>> "optimize", or "accelerate" your Mac. Without exception, they will do the 
>> opposite.
>> 
>> • Never install pirated or "cracked" software, software obtained from 
>> dubious websites, or other questionable sources. Illegally obtained software 
>> is almost certain to contain malware.
>> 
>> • Don’t supply your password in response to a popup window requesting it, 
>> unless you know what it is and the reason your credentials are required.
>> 
>> • Don’t open email attachments from email addresses that you do not 
>> recognize, or click links contained in an email:
>> • Most of these are scams that direct you to fraudulent sites that attempt 
>> to convince you to disclose personal information.
>> • Such "phishing" attempts are the 21st century equivalent of a social 
>> exploit that has existed since the dawn of civilization. Don’t fall for it.
>> 
>> • Apple will never ask you to reveal personal information in an email. If 
>> you receive an unexpected email from Apple saying your account will be 
>> closed unless you take immediate action, just ignore it. If your iTunes or 
>> App Store account becomes disabled for valid reasons, you will know when you 
>> try to buy something or log in to this support site, and are unable to.
>> 
>> • Don’t install browser extensions unless you understand their purpose. Go 
>> to the Safari menu > Preferences > Extensions. If you see any extensions 
>> that you do not recognize or understand, simply click the Uninstall button 
>> and they will be gone.
>> 
>> • Don’t install Java unless you are certain that you need it:
>> • Java, a non-Apple product, is a potential vector for malware. If you are 
>> required to use Java, be mindful of that possibility.
>> • Disable Java in Safari > Preferences > Security.
>> • Despite its name JavaScript is unrelated to Java. No malware can infect 
>> your Mac through JavaScript. It’s OK to leave it enabled.
>> 
>> • Block browser popups: Safari menu > Preferences > Security > and check 
>> "Block popup windows":
>> • Popup windows are useful and required for some websites, but popups have 
>> devolved to become a common means to deliver targeted advertising that you 
>> probably do not want.
>> • Popups themselves cannot infect your Mac, but many contain resource-hungry 
>> code that will slow down Internet browsing.
>> • If you ever see a popup indicating it detected registry errors, that your 
>> Mac is infected with some ick, or that you won some prize, it is 100% 
>> fraudulent. Ignore it.
>> 
>> • Ignore hyperventilating popular media outlets that thrive by promoting 
>> fear and discord with entertainment products arrogantly presented as "news". 
>> Learn what real threats actually exist and how to arm yourself against them:
>> • The most serious threat to your data security is phishing. To date, most 
>> of these attempts have been pathetic and are easily recognized, but that is 
>> likely to change in the future as criminals become more clever.
>> 
>> • OS X viruses do not exist, but intentionally malicious or poorly written 
>> code, created by either nefarious or inept individuals, is nothing new.
>> 
>> • Never install something without first knowing what it is, what it does, 
>> how it works, and how to get rid of it when you don’t want it any more.
>> 
>> • If you elect to use "anti-virus" software, familiarise yourself with its 
>> limitations and potential to cause adverse effects, and apply the principle 
>> immediately preceding this one.
>> • Most such utilities will only slow down and destabilise your Mac while 
>> they look for viruses that do not exist, conveying no benefit whatsoever - 
>> other than to make you "feel good" about security, when you should actually 
>> be exercising sound judgment, derived from accurate knowledge, based on 
>> verifiable facts.
>> 
>> • Do install updates from Apple as they become available. No one knows more 
>> about Macs and how to protect them than the company that builds them.
>>  
>> Summary: Use common sense and caution when you use your Mac, just like you 
>> would in any social context. There is no product, utility, or magic talisman 
>> that can protect you from all the evils of mankind."
>>  /End Quote
>> 
>> Cheers,
>> Ronni
>> 
>> 13-inch MacBook Air (April 2014)
>> 1.7GHz Dual-Core Intel Core i7, Turbo Boost to 3.3GHz
>> 8GB 1600MHz LPDDR3 SDRAM
>> 512GB PCIe-based Flash Storage
>> 
>> OS X Yosemite 10.10.2
-- The WA Macintosh User Group Mailing List --
Archives - <http://www.wamug.org.au/mailinglist/archives.shtml>
Guidelines - <http://www.wamug.org.au/mailinglist/guidelines.shtml>
Settings & Unsubscribe - <http://lists.wamug.org.au/listinfo/wamug.org.au-wamug>