{"id":11065,"date":"2013-03-21T12:31:02","date_gmt":"2013-03-21T19:31:02","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11065"},"modified":"2024-05-21T00:57:28","modified_gmt":"2024-05-21T07:57:28","slug":"5-more-mac-malware-myths-and-misconceptions","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/","title":{"rendered":"5 More Mac Malware Myths and Misconceptions"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10603\" title=\"malware-myths-that-wont-die-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-that-wont-die-header.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-that-wont-die-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-that-wont-die-header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-that-wont-die-header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability among the Mac community. We covered <a href=\"https:\/\/www.usatoday.com\/story\/tech\/2013\/03\/21\/malware-myths-identity-theft-cybercrime\/2005719\/\">10 malware myths that refuse to die<\/a>\u00a0for USA Today, but there are plenty more than 10 misconceptions being passed around. Of the many reasons to love Macs, immunity to danger is not one of them. For a while now, people have felt a sense of security because they\u2019re on an operating system that doesn\u2019t inspire hundreds of thousands of new malware a day. But the total number of malware crawling around the Internet waiting to infect your computer is less important than this simple fact: it only takes one to ruin your day. By going out on the Internet with a false sense of safety, you can leave yourself more open to that malware bullet with your name on it.<\/p>\n<p>So what are some of the biggest Mac malware misconceptions that need to be cleared up? Here are five of the most prevalent ones:<\/p>\n<h3>1. Macs Don\u2019t Get Viruses<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12341\" title=\"virus-free\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/virus-free.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/virus-free.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/virus-free-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/virus-free-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>If you mean Windows-specific file viruses do not harm Macs, you\u2019re totally right. If you mean self-replicating code doesn\u2019t happen on Macs, there is really no period of time in which this statement has ever been true. Elk Cloner, the very first virus to be discovered in the wild, was written specifically for Apple DOS 3.3. Since then, every Mac OS has had some manner of virus or worm. There have been macro viruses capable of spreading on Macs as long as people have been using MS Office on Macs. The first OS X specific worm was discovered in 2006, so they do indeed exist.<\/p>\n<p>There are not a lot of viruses running around in Mac-land today, because there are not a lot of <em>viruses<\/em> running around, period. They\u2019ve fallen out of favor with the malware-writing crowds, even on Windows. They\u2019re a heck of a lot of work to make, they tend to cause system instability, and they\u2019re no more difficult to find and remove than other non-replicating forms of malware. Bang-for-buck-wise, viruses are just not worth the effort.<\/p>\n<p>But that\u2019s not to say there aren\u2019t other types of malicious code causing problems for Mac users. Malware doesn\u2019t have to replicate to be a pain in your machine. There are a lot of different types of threats to Macs, but the most common one these days is spyware \u2013 it gets into your system and steals your data, whether it\u2019s in text laying around your file-system or it requires eavesdropping on your chat sessions.<\/p>\n<h3>2. Mac Malware Requires You to Input Your Password<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12345\" title=\"password-prompt\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/password-prompt.png\" alt=\"\" width=\"500\" height=\"445\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/password-prompt.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/password-prompt-150x133.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/password-prompt-300x267.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>You generally need to input your password to install things on a Mac, so this is true with malware too, right? Not even a little. There was a very brief period of time in which this might have been partially true \u2013 the first OS X malware was what we call \u201cProof of Concept,\u201d meaning its intent was to prove a point rather than to actually cause damage or steal anything. It didn\u2019t mean to be harmful, so it didn\u2019t have to be particularly stealthy because people who were running the file knew exactly what it was meant to do (prove a point about malicious code). But again, we run into that whole macro virus thing, and those did not require separate installation or entering of passwords.<\/p>\n<p>Now, malware is meant to bring in cash, so malware writers are motivated to make their creations stealthier. It can be tricky to get people to install some random piece of software as folks get more wary of threats. So most malware now employs some kind of exploit in order to install the malicious code without you even knowing. Drive-by downloads on compromised websites or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ads-huge-source-of-malicious-content-java-vulnerabilities-behind-80-percent-of-exploits\/\">in malicious advertisements<\/a> is now the order of the day. It doesn\u2019t matter what browser you use, they\u2019re all vulnerable to some extent. Removing commonly attacked browser plugins can certainly help, but Java and Flash are not the only culprits (they\u2019re the most popular because most people use them, regardless of operating system).<\/p>\n<h3>3. OS X\u2019s Built-In Protection Will Save the Day<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12347\" title=\"gatekeeper\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-security-features-in-os-x-mountain-lion\/\">OS X has a handful of ways to improve your security<\/a>, some that are built in to the operating system itself, and some that are separate components. The three most important components are the Application Firewall, Gatekeeper, and XProtect (also known as File Quarantine). These are all fantastic and we heartily recommend people use them.<\/p>\n<p>However, they\u2019re all limited by design. The Application Firewall will block incoming communications, but not outgoing. Gatekeeper is still vulnerable to malware that uses exploits. And XProtect will protect you only against certain specific, prevalent malware, and usually quite a while after the malware picks up steam.<\/p>\n<p>OSX\/Flashback hit over 600,000 Mac users before it was incorporated into XProtect. When <a href=\"https:\/\/www.intego.com\/mac-security-blog\/more-details-surface-about-recent-apple-hack\/\">Apple\u2019s own developers were hit with OSX\/Pintsized<\/a>, none of those protections saved them.<\/p>\n<h3>4. There are No Mac Malware Affecting Real People<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12349\" title=\"mac-user\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/mac-user.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/mac-user.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/mac-user-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/mac-user-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Let me throw a few names at you: Flashback. Pintsized. DNSChanger. MacDefender. Three of these malware hit large numbers of Mac users in the last few years; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\">one of them also hit Apple\u2019s own developers<\/a>. Malware is real, and it hurts. Two of these malware left infected users\u2019 machines open to attackers, to do what they pleased with them. One stole credit card information and \u201cnominal fees,\u201d and the last redirected users\u2019 attempts to surf the web so the attackers could increase ad revenue. The underlying theme is profit motive \u2013 where there is a buck to be gained, there is a way. Choice of operating system or other software is not a sufficient deterrent.<\/p>\n<h3>5. OS X is Inherently a Safer Operating System<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12351\" title=\"os-x\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/os-x.jpg\" alt=\"\" width=\"500\" height=\"325\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/os-x.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/os-x-150x97.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/os-x-300x195.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/os-x-400x260.jpg 400w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>As we discussed in point three, there are a few baked-in parts of the OS X operating system and add-on components that help prevent malware. And to some extent, OS X has enjoyed \u201csecurity through obscurity\u201d as it has less market share and was considered less interesting to malware authors. But that\u2019s all changed now, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsofts-shrinking-share-is-sending-malware-elsewhere\/\">as OS X steadily increases in popularity<\/a>. But when it comes right down to it, the differences between the major OSes in terms of security are pretty negligible. None of them present sufficient hurdles for malware writers who are looking to get onto your machine.<\/p>\n<p>None of these things means you\u2019re helpless against the malware onslaught. There are plenty of ways to improve your level of protection. For instance, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-software-updates-make-you-feel-safer-or-sorry\/\">make sure all the software on your machine is updated regularly<\/a>, remove (or limit) browser plugins that you don\u2019t frequently use, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-encryption-and-why-is-it-helpful\/\">encrypt your data<\/a>, and have up-to-date <a href=\"https:\/\/www.intego.com\/business\/virus-barrier\">Mac antivirus software and a two-way firewall<\/a>. It\u2019s better to be properly prepared than to wander blindly and be rudely awakened after things go wrong.<\/p>\n<p><span style=\"font-size: x-small;\"><em>Mac user photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/klash\/3206216434\/\" target=\"_blank\" rel=\"noopener\">iklash\/\uf8ff<\/a> (<a href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">CC BY-NC 2.0<\/a>)<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability among the Mac community. We covered 10 malware myths that refuse to die\u00a0for USA Today, but there are plenty more than 10 misconceptions being passed around. Of the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10605,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[86,4739],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 More Mac Malware Myths and Misconceptions - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-21T19:31:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T07:57:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Backdoor Definition\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\",\"name\":\"5 More Mac Malware Myths and Misconceptions - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage\"},\"datePublished\":\"2013-03-21T19:31:02+00:00\",\"dateModified\":\"2024-05-21T07:57:28+00:00\",\"description\":\"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 More Mac Malware Myths and Misconceptions\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"5 More Mac Malware Myths and Misconceptions\",\"datePublished\":\"2013-03-21T19:31:02+00:00\",\"dateModified\":\"2024-05-21T07:57:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage\"},\"wordCount\":1164,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg\",\"keywords\":[\"Malware\",\"Myths\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/","og_locale":"en_US","og_type":"article","og_title":"5 More Mac Malware Myths and Misconceptions - The Mac Security Blog","og_description":"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability","og_url":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-21T19:31:02+00:00","article_modified_time":"2024-05-21T07:57:28+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg","width":"400","height":"260","caption":"Backdoor Definition"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/","name":"5 More Mac Malware Myths and Misconceptions - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage"},"datePublished":"2013-03-21T19:31:02+00:00","dateModified":"2024-05-21T07:57:28+00:00","description":"There are plenty of myths about malware in general, but Macs especially seem to attract an extra dose of mythos due to a smug sense of invulnerability","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"5 More Mac Malware Myths and Misconceptions"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"5 More Mac Malware Myths and Misconceptions","datePublished":"2013-03-21T19:31:02+00:00","dateModified":"2024-05-21T07:57:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#webpage"},"wordCount":1164,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg","keywords":["Malware","Myths"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/malware-myths-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2St","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11065"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11065"}],"version-history":[{"count":23,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11065\/revisions"}],"predecessor-version":[{"id":100703,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11065\/revisions\/100703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10605"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}