(March 2019) If you get a phone call asking you for your bank PIN or secrets, or telling you you have "viruses on your computer," it is probably a scam. Caller ID can be faked. The scammers are very plausible. DON'T BE FOOLED. Hang up and call the bank yourself (don't Google for the number -- Google can be fooled -- look on your card).
(February 2018) You know not to click on suspicious links in websites -- but that advice is becoming less useful, since the bad guys have started buying advertisements on various ad networks and sending you malware hidden in ads. Sometimes they get a legitimate ad approved, and then switch it; or they sneak malware into an ad from a careless company. One way to avoid this is to install an ad blocker into your browser. I use uBlock Origin.
Criminals are working hard to get you to run their programs on your Mac. If you click on a link in a malicious e-mail or view a web page that contains an attack, your computer can be infected with malware or ransomware. This can cost you money and time, get you in trouble with friends and the law, steal your identity or your disk files, or mess up your computer.
If Facebook, or any web page, says you should install a Flash upgrade or a Video Codec, DON'T CLICK IT. Don't Install "Mac Defender", or similar fake anti-virus scareware.
Here's a nice Guide To Not Getting Hacked .
To update Apple software, start with the java.com, and find and download the update. Adobe Flash has an "automatic update" option. Turn it on, or get rid of Flash entirely.menu item. To update non-Apple software safely, restart your browser, type in the URL of the company website, e.g.
Here is a useful page on malware: Mac Malware Guide: Am I Infected?. (The Safe Mac has been bought by Malwarebytes, which makes Mac anti-malware software.) Also, please read my pages on Loss Protection and backup.
Because I am a "security guy," I put up with some inconvenience to keep my computers more secure. Everyone's security situation is different, and these tactics may be too much, or not enough, for people with different concerns. The measures you should take depend on what you are trying to defend against, and the value to you of the information on your computer that you want to protect. (Many of these measures also work or have analogues on other systems such as Linux and Unix.) Some of these steps may be too detailed for the general reader, but perhaps they will suggest the complexity of the security problem and the need to use multiple solutions.
Apple has produced Security Feature Guides for OS versions from 10.3 (Panther) to 10.6 (Snow Leopard) with advice from the NSA. They are very thorough. There are some security measures that I have not chosen, after considering my security risks:
Here is a nice article on The Top 10 Online Scams by Kirk McElhearn of Intego.
Here is a good set of Safety Tips from Sophos.
Almost all malware programs out there are not actually viruses but Trojan Horses. That is, the threats are programs that trick YOU into typing your admin password and installing them. For example, if you get a mail message that says "From: Microsoft" and has a link to click that will update Microsoft Word, DON'T. Similarly for mail that appears to be from PayPal, eBay, or your bank. (Mail senders can be forged. Links in mail may not go where you think.) If you're browsing a web page and you get a popup window that wants you to update your Flash player, DON'T. (There are multiple fake updaters for Flash, some spread via Facebook.) There are current attacks on Macs that do these things.
I have written elsewhere about general suggestions on home computer security. Summary:
Use common sense. To avoid malware problems, use good sense when surfing and clicking. Don't enter sensitive information, like credit card numbers, into untrusted or insecure web pages. Be suspicious. Watch out for scams and fraud. Here is a nice article: Mac security: scams and fraud.
Here is a 2019 "beginner's list" of security measures you can take to protect yourself.
(Dec 2017) I wasn't a fan of commercial anti-virus packages for the Mac... but I'm changing my mind. Some packages are better than others. I have been working with a company that uses ESET anti-virus, and it seems to work OK; I got it for some family members. It's good for people who click on a lot of links in email or browse to many Internet sites.
Malware scanners can check your whole hard drive, or selected files, when you tell them to. Malware checkers attach themselves into programs on your computer, such as Mail, and check files when they enter your computer; to do this they have to hook into applications and system facilities in ways that the malware cannot bypass. Such hookups are sometimes broken by OS updates, or lead to problems using your computer, or consume excessive resources.
Anti-malware programs' definition files must be updated very often in order to be useful. Anti-malware companies constantly capture and analyze new malware that is designed to evade existing detectors. Then they update their malware definitions and detection methods, and make updates available to you. Your computer can be attacked before you get protection installed. Multiple malware variants are often released in a single day, faster than the anti-malware software can be updated to catch it.
Mac anti-malware packages are available from ESET, Sophos, Intego, F-Secure, PC Tools, BitDefender, McAfee, ClamXav, Norton, SecureMac, and Avast!. They all claim to the the best.
Beware: the bad guys are also sending out spam email offering you fake anti-virus software. I get a couple of these a day. If you install it, it may pretend to work, while taking over your system.
(January 2018) Security holes Meltdown and Spectre have been found in most minicomputer CPUs, especially those from Intel. These bugs allow a program running on your computer to look at information that it should not be able to see. See the Google Project Zero security blog for the best information. Apple released macOS High Sierra 10.13.2 Supplemental Update on 08 Jan 2018, to mitigate the effects of the "Spectre" bug. Earlier versions of macOS have no fixes available.
(November 2017) Lots of attacks on Microsoft Word files. If you open a Word file and get warning dialogs, do not click OK.
(October 2017) Major security holes have been discovered in WPA2 WiFi (KRACK) and Bluetooth (BlueBorne). Be sure to only use access points you trust, patch your home routers, patch your phones and Macs.
(June 2017) Ransomware is spreading everywhere. So far it only affects Windows machines that aren't updated. But be cautious!
Phishing is getting sophisticated.
A recent trend is to send you mail with a Word macro virus, and then to call you on the phone insisting that you read the file.
(Jan-Mar 2017) Lots of faked messages pretending to be from Apple.
(Nov 2016) Beware of faked mail telling you to click something. You know this by now. For instance, here is the story of how John Podesta was fooled by a fake message from Gmail: https://labsblog.f-secure.com/2016/10/31/how-to-vet-url-shorteners-2016campaignedition/ And today, I got a fake message saying someone had tried to log into my Apple ID. Both of these messages used "URL shorteners." Don't trust 'em.
(June-July-August 2016) Keep your Apple software and Microsoft Office updated with recent security fixes. Also update your router firmware.
(February 2016) Remember that the US Internal Revenue Service never contacts people by email. Apple will never send you mail saying your AppleID is suspended, or your iTunes account was charged $x, click to see details. Same for EBay, PayPal, Netflix, and so forth.
(June 2015) Many scary headlines about a bug in OS X and iOS that allows hackers to steal your passwords. It starts if you install a malicious app from Apple's App Store, for either the Mac or the iPhone, so be cautious about installing third party software. This is like a headline that says "EVERY ROOM IN YOUR HOUSE has multiple places that COULD KILL YOU (... if you stick a fork in the electric socket)". Use common sense. Don't trust every stranger.
(Dec 2014) Even more security holes have been found in Macs. Apple sent out an update to the Network Time Protocol daemon on 22 December for Mavericks and Yosemite. There are also reports of malware that can be installed via a USB or thunderbolt port. Additional attacks on home routers have been discovered.
(Oct 2014) There have been lots of scary news articles about Mac security recently. The "shellshock" vulnerability was actually not much threat to Mac users who don't meddle with advanced settings. The "iWorm" malware only hit those Mac users who installed pirated software -- don't do that. The "POODLE" bug allowed bad guys to hijack your HTTPS sessions and steal your credentials if you used an untrusted WiFi connection -- don't do that either. Apple released fixes for shellshock and POODLE, and updated its download protection against iWorm.
(Sep 2014) I got a very realistic fake email claiming to be from Apple: it said "the password for your AppleID has been reset. if this wasn't you, go to this link and set it back." Many other people are getting this too. I noticed that the link in the mail didn't go to Apple. If I had clicked, they would have asked for my old password and security questions and been able to steal money from me, look at my online data and pictures, and get more mail addresses to attack others. If you get a message like this, don't click. Open up iCloud.com by typing the name in the address bar -- only from a safe WiFi or wired connection (also check that the lock shows in the URL bar) and verify that your old password is still good.
(Jul 2014) Don't download software from CNet. It comes with stuff you didn't ask for, that hijacks your browser's search engine, installs adware, and who knows what else. (Story from MacInTouch, look for "spigot.") Don't download a program called "Geneio," which also inserts ads into pages you view with web browsers. Don't download a Safari extension called "Awesome Screenshot," which also inserts ads into pages you view with web browsers. Other sites that install adware with your downloads include Softonic and Download.com, and pirate torrent sites.
(Jan 2014) Some home routers have "back doors" built into them by their manufacturers. Make sure yours isn't one. Here is a page with more detail on the problem. These back doors allow a bad guy to take over your router and silently redirect your web browsing to fake sites. They could spoof your online banking site and steal your money, or do other bad things. If your router has a manufacturer back door, replace it. On your Mac, change your DNS servers from the default to OpenDNS or Google DNS. On your router, put a password on your Wi-Fi network, change your router passwords from the vendor default, and disable external management. If you use a router you do not control, like public Wi-Fi, it could be hacked: use HTTPS browsing only, and be cautious.
(Jun 2014) A researcher demonstrated an attack that steals Comcast account credentials if you come within range of an "evil twin" hotspot. Somebody could set up an access point named "xfinity" or "att" and your device would believe the name and connect to it. AT&T configures iPhones to connect automatically to its hotspots. Configure your Mac and iPhone/iPad not to join networks without asking. If your device wants to connect to a network, be cautious; if it asks you for your account credentials, be aware that it could be a password stealer.
(Mar 2014) Microsoft announced that there is a security hole in Rich Text Format (RTF) files that hackers are actively exploiting. Don't click on any downloaded .rtf files, and stay tuned. See Microsoft Security Advisory KB 2953095.
(Jan 2014) There are "undelivered item" emails being sent that contain links that will install Mac malware without asking you for a password. Don't click 'em. The malware gives complete access to all files on your Mac to the bad guys, and lets them run any command, including installing more malware. Be vigilant, and use Firefox or Chrome instead of Safari.
(Jan 2014) Some users of the Chrome browser who installed third-party extensions are being flooded with spam, which could include ads that send the user to infection sources. This happens when spammers buy the rights to a formerly-trusted extension from the developer, and send an automatic update that adds the spamming. Be cautious about which browser add-ons you choose.
(11/29/13) Many people are getting forged mail or text messages, ostensibly from Google, saying "your mail has been hacked." Forged messages from UPS, banks, etc with ZIP attachments containing virus droppers are also spreading: I get a few a week. Don't open ZIP attachments unless you are sure they are not forged; scan such files for virus before using.
(08/06/13) There are new phishing scam emails: one that says "your account has been suspended" and appears to come from Apple and one that appears to be a connection request on LinkedIn. Don't Click Links In Email unless you are sure they are not forged.
(January 2013) Two vulnerabilities in Ruby on Rails made over 200,000 websites exploitable. Clicking on an infected website could lead to multiple attacks: some might try to spoof popup windows that ask for your password, and others might find a hole that can be exploited without asking. Hacking toolkits are expected to exploit both holes soon. Click cautiously and apply security patches when available.
The FBI is investigating cases where malware was installed on travelers' laptops through application software updates on hotel internet connections.
Several Trojan Horse attacks are also being distributed via infected Microsoft Word files.
Make sure you apply the latest update to Word 2011. (Only Snow Leopard and below are vulnerable to this attack.)
There is also a serious security threat that attacks Macs that just visit an infected web page:
the malware tries to steal financial passwords from your computer.
It has been estimated that over 500,000 Macs have been infected.
Protect your computer by installing the latest Java from Oracle, or disable Java.
See the page on The Flashback Malware for detailed instructions.
(Jan 2014) There are still 22,000 Macs infected by Flashback.
(March 2012) The various incarnations of the Flashback Trojan use ever changing tricks to get you to install it. Vist a hacked website, and you may see dialog boxes requesting your admin password with various excuses (such as a fake password dialog box from "Software Update"), or you may see a request to accept a certificate that claims to be from Apple but is not. If you get fooled, you are in big trouble: the Trojan will install code into your browser so it can steal your banking passwords and watch your traffic. Many blogs have been hacked recently, to send malware to your browser or redirect it to a malicious page that does so. Using Firefox with FlashBlock and NoScript or Chrome with ScriptNo will help catch these attacks. OpenDNS will also prevent access to some malicious URLs. Make sure you have Java up to date, and do not accept fake (self signed) Apple certificates.
Macs used to have fewer security problems than Windows because hackers concentrated on the flaws in Windows, but those days have passed. Over time, Windows has improved, and Apple should be working hard to improve also. Mac OS, Windows, Linux, and other Unix descendants are all written in the C language using informal processes. Brilliant programmers have failed to produce secure systems using this approach in many years of trying.
It is your responsibility to keep informed about your computer's security. Attackers will continue to try new ways to break into your computer and your online accounts. Even if you were fully protected yesterday, some new attack might be discovered tomorrow.
I think Microsoft does a better job with their code auditing than folks like Apple do. We've only seen a scratching of the surface as far as Apple vulnerabilities because nobody cares to find them. There's nothing inherent with Apple themselves and their development.
-- Marc Maiffret, former hacker