pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Macs Get Viruses Too – So Take Precautions

I recently talked to a colleague in Spain about the cybersecurity landscape over there. He made a good point about the fact that Macs are believed to be a lot more secure than they actually are. A lot of this is due to misinformation that originated in the United States, which led to Mac users in other countries making bad decisions about securing their computer.

The Myth that Macs are Secure from Malware

It was due to a commercial broadcast in the United States and other English-speaking countries between 2002 and 2006, that people started to believe the myth that Mac computers were immune to infection by malware (viruses) or other types of malicious software.

In that ad, a man in his forties, dressed in a jacket and tie, stands in front of a young man wearing jeans, tennis shoes and a T-shirt. The man has a cold and sneezes three times, while the youngster asks him if he is all right. “No, I was infected with that virus that’s out there,” he replies and warns: “Don’t go near it, it could infect you, last year there were 114,000 PC viruses. As he reaches for a handkerchief, the young man confidently answers: “for PC, not Mac”.

But recent studies by major cybersecurity firms show the opposite. According to a September Kaspersky report this year, “the number of attacks on macOS users through malicious and potentially unwanted programs has increased annually since 2012, and by 2018 exceeded 4 million. During the first half of 2019, 1.8 million cyberthreats of this type were recorded.”

According to Gustavo Cols, the company’s sales director for Latin America, “the idea that a Mac is invulnerable is absolutely a myth. The reality is that there are fewer of these computers in the market than computers with Windows operating system, so the picture of effectiveness that a cybercriminal can achieve by designing a malware for a Mac can be much smaller and also more expensive. (See graph).

It’s not that Macs are immune, but the attack rate is much lower. This is what Camilo Gutiérrez, head of ESET Latin America’s lab, says. He also points out that this year ten new malware families were detected in this workspace, aimed specifically at Apple’s operating systems. “The number of such threats continues to rise, indicating that, in reality, no operating system is 100 percent secure. That’s why it’s necessary to have a high quality antivirus, which adds layers of security that decrease exposure to potential threats,” he says.

The most common attacks
The vast majority of threats in 2019 are in the AdWare category, according to Kaspersky’s report for MacOS users. You will be able to recognize this type of malicious software by excessive misleading or unwanted advertising on your computer. According to Kaspersky, “the Trojan (virus that camouflages itself as legitimate software) Shlayer, which passes itself off as Adobe Flash Player or an update, has been the most frequent”.

The firm also detected that during the first half of 2019, almost 6 million phishing attacks (mechanism to obtain passwords) were presented in macOS. Of these, 11.8 percent targeted corporate users.

Fredy Romero, professor of the Software Engineering program at the Manuela Beltrán University, explains that this attack consists of supplanting a page and making the user enter to install a malware (infiltrated) that can access all the activity on the computer. Cyber-criminals design a page that is identical to that of their bank, for example, and from there they execute the entire attack.

Apple emphasizes that its internal development is sufficient to protect users; in fact, its security policy for macOS says that all computers have “an integrated antivirus software in charge of blocking and eliminating harmful software”. However, Romero comments that hackers update themselves to design new ways of violating systems, and recommends always protecting themselves with an antivirus, even if at the time of purchase they tell you that it is not necessary.

How do you protect your Mac?


In the digital security market, more and more firms are designing specialized antivirus for macOS, such as Norton, Panda, Kaspersky, or even MacKeeper, which only works on Apple computers.

Although you can find many options, Axel Diaz, specialist in information security and computing Adalid, recommends buying an original and combine it with good habits of protection. “The Mac has its own firewall and internal file monitoring system, but it has already been proven that these have been violated,” he says. However, according to this expert, we should not rely entirely on antivirus, but users should be careful with the programs they install and their provenance.

As an option to support good habits and a certified antivirus, Diaz suggests installing a cleaning tool. Among those recommended by the expert are CleanMyMac, MacShiny and CCleaner.

These options have free 30-day trials and offer constant monitoring cleaning, where you can avoid unwanted advertising.

Filed Under: Computer Security

Latest Articles

6 Healing Healthcare Tech Trends Improving Patient Care in 2021

With cyber taking the name of the game in the pandemic era, healthcare professionals rely more heavily on informational and telehealth technology to treat patients. Thanks to information and telehealth technology, you can improve communication with patients and quality of care. Much healing is … [Read More...]

Best Creative Commons Videos on Learning Adobe Illustrator

Adobe Illustrator is one of the most popular design tools available. The tool has been around since 1987 and is used by over 90% of the world's graphic designers. It is a very robust design tool, but can be difficult to learn. The good news is that there are some great YouTube videos that can … [Read More...]

How to Create Your Own Private VPN

VPN (virtual private network) services have been available online for almost as long as the internet. You probably know the basics by now. In case you need a refresher, the technology establishes an encrypted connection to the internet by routing your requests through a private network. This … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

What is a Digital CRT Monitor and How Does It Work

Nearly 99 percent of all video displays sold in 1998 were connected using an analogue VGA interface, an ageing technology … [Read More...]

SugarSync Review

PROS: SugarSync is very easy to use and install. CONS: Not all phones will be able to download SugarSync at this time. OVERVIEW: SugarSync is by … [Read More...]

Differences with Reverse Image Search on Desktop and Mobile Devices

Searches with images are a Google functionality with which users can find similar images, source of photographs or until the date in which an image … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors