	{"id":11973,"date":"2013-03-26T12:36:24","date_gmt":"2013-03-26T19:36:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11973"},"modified":"2019-05-17T21:50:34","modified_gmt":"2019-05-18T04:50:34","slug":"do-os-xs-built-in-security-features-offer-good-enough-protection","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/","title":{"rendered":"Do OS X&#8217;s Built-In Security Features Offer Good Enough Protection?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12513\" title=\"apple-security-icons-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-header.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>There has been a lot of talk about the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\">malware that hit a number of high profile Mac developers<\/a>\u00a0and the fact that Pintsized got through OS X\u2019s security features. While Apple&#8217;s built-in features are definitely helpful and vastly better than being on the Internet totally unprotected, they are not designed to be a full security solution. There are many very simple ways to get around these security features, and there is no functionality to clean up if something does bypass them.<\/p>\n<p>You may be wondering, &#8220;What are these various security functions? How are they helpful? And how can they be circumvented?&#8221; Here&#8217;s a rundown of Apple&#8217;s most high-profile security features.<\/p>\n<h3>XProtect and Gatekeeper<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12533\" title=\"gatekeeper-tower\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-tower.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-tower.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-tower-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/gatekeeper-tower-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-the-anti-malware-function-in-apples-snow-leopard-works\/\">XProtect was designed<\/a> as a way to prevent or mitigate some general problems and specific threats that were hitting a large section of their userbase. The general protections are the warnings you see about potentially dangerous file-types. The anti-malware component does help detect malware, but it\u2019s intended to be strictly reactive. The detections are quite specific, and there is no heuristic or generic detection. <strong>There is almost no chance it would detect something brand new. <\/strong><\/p>\n<p>XProtect is not intended to be what one would consider a \u201cmodern AV product\u201d \u2013 it\u2019s only designed to find a very small handful of existing threats. There\u2019s also a big window between the time researchers (from Apple or from other security companies) discover new Mac-related threats and when they\u2019re added to XProtect. Malware that is less prevalent never makes it into XProtect, which isn\u2019t much help if you\u2019re one of those few who are affected. In the case of the watering hole attack, XProtect was not updated to cover this threat \u2013 Apple <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-10-8-3-released-with-apples-security-update-2013-001\/\">created a removal tool<\/a> which was originally bundled with a Java update, which makes sense in that the threat relied on Java to infect.<\/p>\n<p><a href=\"http:\/\/support.apple.com\/kb\/ht5290\">Gatekeeper<\/a> was designed to help limit the applications that you can intentionally install. It can be helpful when a threat relies solely on social engineering to get you to infect your system \u2013 the dreaded double-click of doom. But if the malware authors manage to get hold of a certificate to sign their creations so that it looks legit, you\u2019re out of luck. Or if the threat uses an exploit (such as the Java 0-day in this instance) to install silently, you\u2019re once again out of luck.<\/p>\n<p>Both Gatekeeper and XProtect care about where you got a given file \u2013 if you\u2019ve gotten a file from fixed media (from a disk, rather than from the Internet) or from applications that are not ones that it monitors, it won\u2019t warn you. And if it\u2019s one of the file-types OS X considers safe, it also will not warn you. And both features only concern themselves with files coming into your machine. They won\u2019t prevent malware from going out (should you share a file via Dropbox or email, for instance).<\/p>\n<h3>Apple\u2019s Firewall<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12501\" title=\"apple-application-firewall\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-application-firewall.png\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-application-firewall.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-application-firewall-150x90.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-application-firewall-300x180.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><a href=\"http:\/\/support.apple.com\/kb\/PH11309\">The Application Firewall<\/a> was designed to protect you from attacks coming from outside your machine \u2013 <strong>it filters inbound connections, but not outbound<\/strong>. This is great if someone is trying to use common attack tools that try to look for listening ports, but not so great if the threat has somehow managed to get on your machine already, as in the case of malware. If malware or hackers manage to get into your machine, they can send your data out to attackers. Ideally, you should be alerted to strange traffic both coming into and going out of your machine, so if they manage to bypass one defense, they may not get past the next.<\/p>\n<p>You have three main options when you set up Apple\u2019s firewall:<\/p>\n<ol>\n<li>The default option is to let only signed applications connect into your computer.<\/li>\n<li>Another option is to block all non-essential incoming connections, which will obviously limit many common programs that might need to communicate with your machine.<\/li>\n<li>The final option is to enable \u201cStealth Mode,\u201d which means it will not acknowledge (or respond to) requests from diagnostic tools that use <a href=\"http:\/\/en.wikipedia.org\/wiki\/Internet_Control_Message_Protocol\">ICMP<\/a>, like Ping or Traceroute.<\/li>\n<\/ol>\n<p>You can use any one option individually or in combination with the others. And you can allow or block specific applications separate from these three options.<\/p>\n<h3>Sandboxing<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12503\" title=\"apple-app-sandbox\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-app-sandbox.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-app-sandbox.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-app-sandbox-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-app-sandbox-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>When you&#8217;re dealing with something potentially explosive, sometimes the best thing to do is to try and limit the damage. Exploits work by busting their way out of the context of an application so they can get into areas where they\u2019re not really supposed to be in order to run whatever code they like. So, if an app developer creates a <a href=\"http:\/\/developer.apple.com\/library\/mac\/#documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AboutAppSandbox\/AboutAppSandbox.html\">sandboxed version of their product<\/a>, they can essentially put themselves in a walled-off enclosure that limits what damage a potential exploit can do. Apple has required this of apps that are sold in their App Store. It\u2019s good for users, in a security context, for developers to take this measure if they can. (Plus, being in the App Store is good exposure for the developer.)<\/p>\n<p>As we all know, because iOS only lets you install apps from the App Store (unless you\u2019ve jailbroken your device), this is how all iOS apps operate. This is a big limitation of their functionality versus what you can do with apps on a mobile OS like Android, but also why there has been very little interest by malware authors in creating threats for iOS thus far. It&#8217;s simply too much work for too little benefit right now.<\/p>\n<p>Because it severely limits what apps can do, for many products sandboxing may simply degrade the user experience too much. Applications that are popular due to 3<span style=\"font-size: 11px;\">rd<\/span>\u00a0party plugins, allow you to access files throughout your system or on a network, or interact with non-USB devices can\u2019t be sandboxed. That covers a lot of popular products, including utilities like anti-virus software, among many others. So <strong>while it does limit the possibility and power of exploits, it also severely limits the power of the applications themselves, so not all developers can or will sandbox their apps<\/strong>. (Searching for websites pertaining to OS X Sandboxed Apps largely returns articles with words like <em>Sad<\/em>, <em>Frustration<\/em>, <em>Ruin<\/em>, and <em>Killjoy<\/em> in the title;, and these articles are mostly written by app developers. \u2018Nuff said.)<\/p>\n<h3>Address Space Layout Randomization (ASLR)<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12511\" title=\"aslr\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/aslr.jpg\" alt=\"\" width=\"500\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/aslr.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/aslr-150x60.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/aslr-300x120.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Without going into painful technical detail, the short of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Address_space_layout_randomization\">ASLR<\/a> is that it tries to make it harder for people to use vulnerabilities in software to create exploits that run arbitrary code. At this point, every major OS has implemented ASLR to some extent, and these versions have been around for many years. Yes, even Windows and Android have ASLR. And, as we\u2019ve not yet heard about the end of exploits, and the jailbreaks or malware that use them, I\u2019m gonna go out on a limb and say this has not really been a sufficient deterrent in the fight against vulnerabilities leading to exploits. <strong>Bypassing ASLR has simply become the new cost of entry.<\/strong><\/p>\n<h3>It&#8217;s a Start, But It&#8217;s Not Foolproof<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12521\" title=\"fair-checklist\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/fair-checklist.jpg\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/fair-checklist.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/fair-checklist-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/fair-checklist-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>In all these cases, these security features are awesome tools that make you way safer than having no protection at all. They\u2019re meant to help keep you safe from some fairly common types of attacks, but by no means all types. <strong>Each feature leaves some pretty large opportunities for malware to get through.<\/strong> And all OS X users have access to this same protection. That means almost all Mac users are protected to at least this degree, and attackers know this. It\u2019s fairly trivial to go beyond that level, which is exactly what happened to the Mac developers that got hit with Pintsized. To be just a little better protected than the next guy, you need to apply additional tools that cover more advanced types of attacks.<\/p>\n<p><span style=\"font-size: x-small;\"><em>Apple app sandbox image via <a href=\"http:\/\/developer.apple.com\/library\/mac\/#documentation\/Security\/Conceptual\/AppSandboxDesignGuide\/AboutAppSandbox\/AboutAppSandbox.html\">Mac Developer Library<\/a><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security features. While Apple&#8217;s built-in features are definitely helpful and vastly better than being on the Internet totally unprotected, they are not designed to be a full security [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12515,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,151],"tags":[168,319,303],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do OS X&#039;s Built-In Security Features Offer Good Enough Protection? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-26T19:36:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-18T04:50:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\",\"name\":\"Do OS X's Built-In Security Features Offer Good Enough Protection? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage\"},\"datePublished\":\"2013-03-26T19:36:24+00:00\",\"dateModified\":\"2019-05-18T04:50:34+00:00\",\"description\":\"There has been a lot of talk about the malware that hit a number of high profile Mac developers\\u00a0and the fact that Pintsized got through OS X\\u2019s security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do OS X&#8217;s Built-In Security Features Offer Good Enough Protection?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Do OS X&#8217;s Built-In Security Features Offer Good Enough Protection?\",\"datePublished\":\"2013-03-26T19:36:24+00:00\",\"dateModified\":\"2019-05-18T04:50:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage\"},\"wordCount\":1325,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg\",\"keywords\":[\"OS X\",\"Security\",\"XProtect\"],\"articleSection\":[\"Apple\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/","og_locale":"en_US","og_type":"article","og_title":"Do OS X's Built-In Security Features Offer Good Enough Protection? - The Mac Security Blog","og_description":"There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security","og_url":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-26T19:36:24+00:00","article_modified_time":"2019-05-18T04:50:34+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/","name":"Do OS X's Built-In Security Features Offer Good Enough Protection? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage"},"datePublished":"2013-03-26T19:36:24+00:00","dateModified":"2019-05-18T04:50:34+00:00","description":"There has been a lot of talk about the malware that hit a number of high profile Mac developers\u00a0and the fact that Pintsized got through OS X\u2019s security","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Do OS X&#8217;s Built-In Security Features Offer Good Enough Protection?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Do OS X&#8217;s Built-In Security Features Offer Good Enough Protection?","datePublished":"2013-03-26T19:36:24+00:00","dateModified":"2019-05-18T04:50:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#webpage"},"wordCount":1325,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg","keywords":["OS X","Security","XProtect"],"articleSection":["Apple","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/apple-security-icons-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-377","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11973"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11973"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11973\/revisions"}],"predecessor-version":[{"id":13213,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11973\/revisions\/13213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/12515"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}