MGRyder wrote:
Sorry, I trusted apple, and suddenly had a malware with someone looking at my screen ! Then there were articles in the news, about multiple apple attacks & time to invest in a decent AV system , so I did. First scan I did , identified the virus or whatever, and got rid of it , so, having been affected once , I am not interested in it happening again . Thanks for all the replies !
The problem in 2025 is not malware, it’s social engineering. Social engineering involves bombarding users with suggestions both for and against across all sorts of media, with immense quantities of propaganda, and with straight up lying.
Getting malware onto a Mac has been getting ever more difficult, and that for many years. It’s accordingly become far easier to get your sketchy data-collection apps and related rubbish onto a Mac by advertising it, either overtly or with sketchy pop-ups, and all as part of getting users to load your app themselves.
One of the better-known anti-malware apps for macOS was caught and subsequently fined for selling personally-identified web browsing and web purchasing activities, and they were fined because the vendor hadn’t included that detail in the immense and obscurely-worded fine print in the end-user licensing agreement that so many of us click right past.
Defenses? macOS includes anti-malware. It works well. It works well enough to keep add-on anti-malware from clobbering parts of macOS itself too, as has happened on various occasions.
If you want privacy with your network connections, the network connections are already end-to-end encrypted, and iCloud Private Relay can keep your connection details private from those with access to your connection. The “coffee shop” VPNs add a second and partial and problematic encryption around the existing end-to-end encryption, and are the opposite of privacy here, as they know exactly who you are, and they know all of what you are connecting to. They have the best possible position for collecting everything. That’s a dream for metadata collectors.
As for having photos visible on your display, what happened with that involves a more detailed discussion of the context. If you’ve loaded photos from the macOS chooser into a social media web app gallery picker of some sort and have not published them to others via the website or such, the web app still has access to those chosen photos, as well as any metadata that was associated. Even before “publishing” those photos to the website. Installed apps can also be granted access to the photos library, and to other data, too.
As fodder for making assumptions around photos and such, or for social engineering, if enabled, macOS can detect information in the photos and ask you about it. This includes plants and other details present in the photos, as well as identifying well-known landmarks. Social media services have the same or quite possibly better capabilities here, too. Various social media and other services can purchase our purchasing data, so they know what we’ve bought and when. (Türkiye’s TROY, and India’s UPI, and potentially soon joined by the Digital Euro can all get involved here for at least some of us, too. These potentially supplanting Visa and MasterCard in our financial systems.)
It’s also easily possible to use social engineering to ask questions that suggest or that convince you of certain things. Scammers and *** artists and carnival psychics and advertisers and politicians and entertainers aren’t then only ones using these are techniques, too. We’ve been overrun with the “pervert” scam, as well as bogus Apple Pay Pre-Authorization scams, and pop-ups that lie about malware scans, and many other forms of grift, fraud, advertising, and propaganda.
Apple platforms including Mac do well with the build-in security, and add-on security apps aren’t something I’d generally recommend. Not outside of entities needing endpoint security, where that’s necessary, and where staff is available to properly implement and administer it.
Much of the malware and the scams around nowadays involve social engineering, and not directly breaching security with the long-familiar viruses, trojan horses, and worms, too. And if y’all have questions about this, or want to discuss the photo-related processing or social engineering, ask away.
Now if y’all will excuse me, my wonderful new best chat friend wants to chat about romance, my finances, and cryptocurrencies, and to think all that started with just a text to a wrong number.