pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Macs Get Viruses Too – So Take Precautions

I recently talked to a colleague in Spain about the cybersecurity landscape over there. He made a good point about the fact that Macs are believed to be a lot more secure than they actually are. A lot of this is due to misinformation that originated in the United States, which led to Mac users in other countries making bad decisions about securing their computer.

The Myth that Macs are Secure from Malware

It was due to a commercial broadcast in the United States and other English-speaking countries between 2002 and 2006, that people started to believe the myth that Mac computers were immune to infection by malware (viruses) or other types of malicious software.

In that ad, a man in his forties, dressed in a jacket and tie, stands in front of a young man wearing jeans, tennis shoes and a T-shirt. The man has a cold and sneezes three times, while the youngster asks him if he is all right. “No, I was infected with that virus that’s out there,” he replies and warns: “Don’t go near it, it could infect you, last year there were 114,000 PC viruses. As he reaches for a handkerchief, the young man confidently answers: “for PC, not Mac”.

But recent studies by major cybersecurity firms show the opposite. According to a September Kaspersky report this year, “the number of attacks on macOS users through malicious and potentially unwanted programs has increased annually since 2012, and by 2018 exceeded 4 million. During the first half of 2019, 1.8 million cyberthreats of this type were recorded.”

According to Gustavo Cols, the company’s sales director for Latin America, “the idea that a Mac is invulnerable is absolutely a myth. The reality is that there are fewer of these computers in the market than computers with Windows operating system, so the picture of effectiveness that a cybercriminal can achieve by designing a malware for a Mac can be much smaller and also more expensive. (See graph).

It’s not that Macs are immune, but the attack rate is much lower. This is what Camilo Gutiérrez, head of ESET Latin America’s lab, says. He also points out that this year ten new malware families were detected in this workspace, aimed specifically at Apple’s operating systems. “The number of such threats continues to rise, indicating that, in reality, no operating system is 100 percent secure. That’s why it’s necessary to have a high quality antivirus, which adds layers of security that decrease exposure to potential threats,” he says.

The most common attacks
The vast majority of threats in 2019 are in the AdWare category, according to Kaspersky’s report for MacOS users. You will be able to recognize this type of malicious software by excessive misleading or unwanted advertising on your computer. According to Kaspersky, “the Trojan (virus that camouflages itself as legitimate software) Shlayer, which passes itself off as Adobe Flash Player or an update, has been the most frequent”.

The firm also detected that during the first half of 2019, almost 6 million phishing attacks (mechanism to obtain passwords) were presented in macOS. Of these, 11.8 percent targeted corporate users.

Fredy Romero, professor of the Software Engineering program at the Manuela Beltrán University, explains that this attack consists of supplanting a page and making the user enter to install a malware (infiltrated) that can access all the activity on the computer. Cyber-criminals design a page that is identical to that of their bank, for example, and from there they execute the entire attack.

Apple emphasizes that its internal development is sufficient to protect users; in fact, its security policy for macOS says that all computers have “an integrated antivirus software in charge of blocking and eliminating harmful software”. However, Romero comments that hackers update themselves to design new ways of violating systems, and recommends always protecting themselves with an antivirus, even if at the time of purchase they tell you that it is not necessary.

How do you protect your Mac?


In the digital security market, more and more firms are designing specialized antivirus for macOS, such as Norton, Panda, Kaspersky, or even MacKeeper, which only works on Apple computers.

Although you can find many options, Axel Diaz, specialist in information security and computing Adalid, recommends buying an original and combine it with good habits of protection. “The Mac has its own firewall and internal file monitoring system, but it has already been proven that these have been violated,” he says. However, according to this expert, we should not rely entirely on antivirus, but users should be careful with the programs they install and their provenance.

As an option to support good habits and a certified antivirus, Diaz suggests installing a cleaning tool. Among those recommended by the expert are CleanMyMac, MacShiny and CCleaner.

These options have free 30-day trials and offer constant monitoring cleaning, where you can avoid unwanted advertising.

Filed Under: Computer Security

Latest Articles

The Ins and Outs of Dedicated Web Hosting

If you're new to the world of web hosting, you've likely been bombarded with options regarding how to best present your site. Perhaps you already know a thing or two about hosting and you're currently looking to move from shared to dedicated web hosting. If so, you're making a step toward complete … [Read More...]

Protect Yourself on the Web With These Three Simple Steps

Most people understand that the passwords to their computers and networks need to be more difficult to guess or crack. All of our computers and devices are connected these days so it is important to keep people out that do no need to be there. There was a time when computers were stand alone devices … [Read More...]

Super DLT Tape Storage

One of the most significant of the new formats is the next generation of Digital Linear Tape (DLT), otherwise known as Super DLT. This is important because developer Quantum accounted for around 80% of the tape drive market by early 1999. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Safe Mode Editing

Repeat the same process as used previously to make a backup copy of the current boot.ini file. This time, however, when the file has been opened in … [Read More...]

Celeron Netburst Class CPU

It subsequently became apparent that even for the Celeron the Tualatin would be no more than a stopgap, only taking the … [Read More...]

Edit and Create Power Profile in Windows 7

Different computers have different power needs. Sometimes a computer may need its full resources most of the time so it needs full power. On the other … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors