{"id":10529,"date":"2013-03-18T10:29:11","date_gmt":"2013-03-18T18:29:11","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10529"},"modified":"2014-04-23T14:10:30","modified_gmt":"2014-04-23T21:10:30","slug":"malware-only-one-tool-in-cybercriminals-arsenal","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/","title":{"rendered":"Don&#8217;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#8217;s Arsenal"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12033\" title=\"tool-box-blog-header\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-blog-header.jpg\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-blog-header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-blog-header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user population last year, there are still some people who don&#8217;t &#8220;believe&#8221; in using <a title=\"Mac Antivirus Software\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">antivirus software<\/a> on their Mac. Usually the reasoning is they&#8217;re &#8220;smart enough to avoid getting infected in the first place,&#8221; or they think the chances of getting infected are really low, especially given Apple&#8217;s own internal security tools. No matter what we or anyone else say to those folks about the increasing risk of Mac malware, they&#8217;ve made up their minds and don&#8217;t want to believe in the necessity of protecting themselves. However, regardless of whether or not you believe malware is a problem on Macs, it&#8217;s not the only threat you should be concerned about.<\/p>\n<p>The aim of most cybercrime is data theft, and malware is just one tool in the arsenal criminals have at their disposal to get hold of sensitive personal information.<\/p>\n<p>Depending on where you are, attackers can reach you a variety of different ways:<\/p>\n<ol>\n<li><strong>Public WiFi &#8212;\u00a0<\/strong>When you\u2019re on public WiFi, you\u2019re sharing a network with complete strangers. There\u2019s no telling who those strangers are or whether they include people who would do you harm \u2013 especially if you\u2019re somewhere very public and crowded, like a hotel or an airport.<\/li>\n<li><strong>Breaches &#8212;\u00a0<\/strong>When your school, bank, email, social networking site, or other keeper of your personal information gets breached, it may provide the attacker enough ammo to steal your identity, or it could give them sufficient information to target you for further attacks.<\/li>\n<li><strong>Hacking Accounts &#8212;\u00a0<\/strong>This may be the after-effect of a breach. Now that you\u2019re on a hacker\u2019s radar, they may send you targeted malware or try to attack your computer directly.<\/li>\n<li><strong>Phishing &#8212;\u00a0<\/strong>This is another way attackers can get into your account. If they find your email in a breach, if it\u2019s published publicly, or if they attack someone who has your contact information, they can send you an email to try to get you to reveal your password.<\/li>\n<li><strong>Targeted Attacks &#8212;\u00a0<\/strong>If you have something an attacker particularly wants, they may go the extra mile to try to install malware or hack into your accounts or computer, creating tools or attacks that specifically target your vulnerabilities.<\/li>\n<\/ol>\n<p>In all of these cases, the goal is the same: someone is trying to take advantage of ways that systems are left open and vulnerable in order to sneak in and make off with your data. Apple does provide some protection already, but it&#8217;s not intended to close all the holes attackers could use to get in.<\/p>\n<p>By using a few additional defenses, you can make their job much, much harder so that your data will be a less tempting target:<\/p>\n<h3>Encrypt Your Data<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12029\" title=\"encryption-lock\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/encryption-lock.jpg\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/encryption-lock.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/encryption-lock-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/encryption-lock-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>There are two times an attacker can go for you data:<\/p>\n<ol>\n<li>When it\u2019s in place on your machine<\/li>\n<li>When it\u2019s in transit to or from the network.<\/li>\n<\/ol>\n<p>On your machine, you need to know what data lives where and then keep it in a central location that you can encrypt. To protect your data in transit, you can use a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\">Virtual Private Network<\/a> to keep out prying eyes. Make sure sensitive data is encrypted by checking to see the website you\u2019re sending to is using HTTPS (rather than simply HTTP) when you look at the URL.<\/p>\n<h3>Use Layered Defenses<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12025\" title=\"layers\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/layers.jpg\" width=\"500\" height=\"402\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/layers.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/layers-150x120.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/layers-300x241.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Apple provides a few ways to keep you from getting harmed by malware\u00a0\u2013 namely XProtect, the Application Firewall, and Gatekeeper. Using all of these technologies is good, but it does leave a few holes.\u00a0XProtect helps detect malware, but there\u2019s still a big window between when researchers discover new Mac-related threats and when they\u2019re added to XProtect. Malware that is less prevalent never makes it into XProtect, which isn\u2019t much help if you\u2019re one of those few that are affected.<\/p>\n<p>Gatekeeper can be helpful in preventing new threats, but there are still plenty of ways malware could get around this tool. Having a dedicated anti-virus program will allow you to detect and remove a wide variety of threats a very short while after they\u2019re discovered \u2013 before they can hit a large number of users.<\/p>\n<p>The Application Firewall will help you filter inbound connections, but not outbound. If malware or hackers manage to get into your machine, it can send your data out to attackers. Having a full-featured firewall can help identify and prevent incoming attacks as well as someone trying to get data out from your machine.<\/p>\n<h3>Update Your Software<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12027\" title=\"update-stamp\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-stamp.jpg\" width=\"500\" height=\"336\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-stamp.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-stamp-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-stamp-300x201.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Humans write software and humans make mistakes, so software sometimes has vulnerabilities which need to be corrected. Most software companies update their products from time to time, and popular software is a popular target by criminals, so they frequently update to fix vulnerabilities. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-software-updates-make-you-feel-safer-or-sorry\/\">Be sure to install those updates as soon as you can<\/a> to limit your exposure.<\/p>\n<p>While there are a lot of ways out there that cybercriminals can try to get your data, there are also a lot of ways you can protect yourself. You don\u2019t necessarily need to have your data locked up tighter than Fort Knox \u2013 you just need to have your data locked up well enough that it\u2019s not easy pickings. By closing up holes, fortifying your defenses, and protecting your valuables, you can make stealing your data more trouble than it\u2019s worth for cybercriminals.<\/p>\n<p><span style=\"font-size: x-small;\"><em>toolbox photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/stitch\/6162233\/\">Stitch<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user population last year, there are still some people who don&#8217;t &#8220;believe&#8221; in using antivirus software on their Mac. Usually the reasoning is they&#8217;re &#8220;smart enough to avoid getting infected in the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12037,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[22,291,305,191,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#039;s Arsenal - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-18T18:29:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-23T21:10:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/\",\"name\":\"Don't Believe in Antivirus? Malware is Only One Tool in a Cybercriminal's Arsenal - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage\"},\"datePublished\":\"2013-03-18T18:29:11+00:00\",\"dateModified\":\"2014-04-23T21:10:30+00:00\",\"description\":\"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#8217;s Arsenal\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Don&#8217;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#8217;s Arsenal\",\"datePublished\":\"2013-03-18T18:29:11+00:00\",\"dateModified\":\"2014-04-23T21:10:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage\"},\"wordCount\":934,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg\",\"keywords\":[\"Antivirus\",\"Cybercrime\",\"Layered Security\",\"Mac Antivirus\",\"Malware\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/","og_locale":"en_US","og_type":"article","og_title":"Don't Believe in Antivirus? Malware is Only One Tool in a Cybercriminal's Arsenal - The Mac Security Blog","og_description":"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user","og_url":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-18T18:29:11+00:00","article_modified_time":"2014-04-23T21:10:30+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/","name":"Don't Believe in Antivirus? Malware is Only One Tool in a Cybercriminal's Arsenal - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage"},"datePublished":"2013-03-18T18:29:11+00:00","dateModified":"2014-04-23T21:10:30+00:00","description":"Even though the number and severity of Mac malware has been growing steadily, and despite Flashback infecting a significant percent of the Mac user","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#8217;s Arsenal"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Don&#8217;t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal&#8217;s Arsenal","datePublished":"2013-03-18T18:29:11+00:00","dateModified":"2014-04-23T21:10:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#webpage"},"wordCount":934,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg","keywords":["Antivirus","Cybercrime","Layered Security","Mac Antivirus","Malware"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tool-box-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2JP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10529"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10529"}],"version-history":[{"count":21,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10529\/revisions"}],"predecessor-version":[{"id":24988,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10529\/revisions\/24988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/12037"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}