eh?"... macOS's Autorun ..."
eh?"... macOS's Autorun ..."
Isnt that already the case? Im not 100% sure but when you do a clean install, in Settings>Security the "Allow apps from" option has only "AppStore" checked instead of "AppStore and identified developers".I wish they could be a little bit more clarity on how to really check for this. Interesting how things have come full circle. I remember years ago reading Total Panther from Macworld and guest columnist David Pogue was bragging about Mac OS X being a better choice than Windows and the upcoming 'Longhorn' because its a smaller user base and hackers are not interested. It was so naive to think that hackers would ignore macOS because its a smaller user base.
These changes to the security landscape will only force Apples hand to potentially lock down macOS, iOS style. It wouldn't be a bad idea for the vast majority of users. Just have a special easy to enable mode for power users who know what they are doing. But for grand ma, Cindy and Todd who just want email, spotify and download apps from the App Store, it shouldn't be a big deal.
Of course! MacDownloader, Safari-get, Word macro viruses, and OSX/Pirrit. Also, a virus is a form of malware.Malware yes, virus for macOS? Not that I'm aware of. Can you name some?
Checked in my Big Sur and Mojave installation, nothing suspicious in either. Thanks for the tip.Found something at 9to5mac
1. Go to /Users/[username]/Library/LaunchAgents directory
2. Check for suspicious filenames in this directory (example below is a random name)
/Users/user/Library/LaunchAgents/com.wznlVRt83Jsd.HPyT0b4Hwxh.plist
if there is a file named like above, it's very likely you have been infected
Malware falls under the "virus" umbrella. Similar to how bronchitis, emphysema etal fall under the "COPD" umbrella. I run a antt-virus, you don't see the need. Different strokes for different folks.All malware except some Microsoft macro's
Are they? Stolen dev certs allow malicious apps to bypass Gatekeeper. Happens a lot more than you think.No matter what these Mac’s are protected. Let’s be real here.
When was the last time you encountered your Mac got a virus?
Other way around with viruses falling under malware, but yes.Malware falls under the "virus" umbrella. Similar to how bronchitis, emphysema etal fall under the "COPD" umbrella. I run a antt-virus, you don't see the need. Different strokes for different folks.
Autorun = "Login Items" in a user's profile.Anyone figure out what the "Autorun" thing is from the end of the article?
Found something at 9to5mac
1. Go to /Users/[username]/Library/LaunchAgents directory
2. Check for suspicious filenames in this directory (example below is a random name)
/Users/user/Library/LaunchAgents/com.wznlVRt83Jsd.HPyT0b4Hwxh.plist
if there is a file named like above, it's very likely you have been infected
I believe it is talking about the 'Library/LaunchAgents' and '~/Library/LaunchAgents' folders.Anyone figure out what the "Autorun" thing is from the end of the article?
I believe it is talking about the 'Library/LaunchAgents' and '~/Library/LaunchAgents' folders.
That's just one of the ways to run something at login. The other is via Login items. Most users never look at this either.I believe it is talking about the 'Library/LaunchAgents' and '~/Library/LaunchAgents' folders.
Agreed, but I'd also check the other in case a malware has obtained elevated permissions. Obviously the user shouldn't go deleting everything they think is suspicious. Do the due diligence and check authenticity prior to deletion.![]()
XLoader malware infects Macs; collects keystrokes and more - 9to5Mac
XLoader malware has now migrated from Windows machines to attack Macs too. An evolution of the malware known as Formbook, it lets ...9to5mac.com
The 9to5 article says it is the users folder.
If you have an app that needs to run either itself or some background process at startup, the app installer will often put a .plist file in that folder telling the OS to launch that process at boot time.MacOS' Autorun? What does that even mean?
And LaunchAgents/Demon in user and macOS LibraryAutorun = "Login Items" in a user's profile.
Open Settings and go to Users & Groups. Find your profile and select the "Login items" tab.
Found something at 9to5mac
1. Go to /Users/[username]/Library/LaunchAgents directory
2. Check for suspicious filenames in this directory (example below is a random name)
Yes, absolutely, the greed factor is in play. Users get an offer of something of value for free (movie, app, music, etc) and the greedy ones click away and get pwned. Torrents have been the main source of malware for decades. You pirate a movie, music, app only to find out it’s loaded with malware.macOS is much more secure but users often doesn't have a clue. Macs can install software other than App Store and you like it or not, this is the main cause of malware diffusion. Cheap users want to download movies and software without paying = they get infected.
But, lots of folks in USA spends thousands buying themselves to an operating system prison just like that, literally allowing Apple to do everything on their devices.If we let Apple do everything they will just lock our devices