The myth that Mac computers are immune to viruses and malware is simply not true. Mac computers can get viruses and need file-based antivirus protection. Additionally, they need the other layers of protection offered in a device security software suite such as Firewall, Intrusion Prevention and Anti-phishing Protection.
Phishing refers to fraudulent attempts to get personal information from you. Scammers use any means they can—spoofed emails and texts, misleading pop-up ads, fake downloads, calendar spam, even phony phone calls—to trick you into sharing information, such as your Apple ID password or credit card numbers.
- Download Malwarebytes for Mac (the free version) and you get a 14-day trial of the premium version with automatic (real-time) virus and malware protection. After 14 days, your trial reverts to a limited disinfection scanner. Buy the premium version now to prevent infection in the first place.
- The Best Mac Antivirus Protection for 2020 Despite what you may have heard, your Apple computer is not immune to malware. We test the top contenders to identify those offering the best Mac.
- How macOS Protects Your Computer. Your Mac has many built-in security features to keep it safe. The bedrock of macOS (formerly Mac OS X) is a rock-solid Unix foundation. This is the same operating system on which BSD and Linux were built, and it’s earned its reputation for reliability and security thanks to a robust permissions system.
If you receive a suspicious email that looks like it's supposed to be from Apple, please forward it to [email protected].
On your Mac, include more details by selecting the email and choosing 'Forward as Attachment' from the Message menu.
How to avoid phishing and other scams
While browsing the web, if you see a message that your iPhone, Mac, or other Apple device has a virus, or someone claiming to be from Apple calls and asks for your account name and password, you’re likely the target of a scam. Here are some things you can do to avoid them.
- Protect your Apple ID. Use two-factor authentication, always keep your contact information secure and up to date, and never share your Apple ID password or verification codes with anyone. Apple never asks for this information to provide support.
- Learn how to identify legitimate Apple emails about your App Store or iTunes Store purchases.
- Never use App Store, iTunes, and Apple Store Gift Cards to make other kinds of payments.
- If you send or receive money with Apple Pay (U.S. only), treat it like any other private transaction.
- Learn how to keep your Apple devices and data secure.
- In general, never share personal information like credit card numbers, unless you can verify the recipient is who they claim to be.
- Don't follow links or open or save attachments in suspicious or unsolicited messages.
- If you have any doubts about a request or communication, or even if you if you just need to update your information with a company, contact that company directly.
If you believe that your Apple ID has been compromised, or if you might have entered your password or other personal info on a scam website, change your Apple ID password immediately.
If you get a suspicious email or message
Scammers try to copy email and text messages from legitimate companies to trick you into giving them your personal information and passwords. These signs can help you identify scams:
- The sender’s email or phone doesn’t match the name of the company that it claims to be from.
- The email or phone they used to contact you is different from the one that you gave that company.
- A link in a message looks right, but the URL doesn’t match the company’s website.*
- The message looks significantly different from other messages that you’ve received from the company.
- The message requests personal information, like a credit card number or account password.
- The message is unsolicited and contains an attachment.
Please report suspicious emails and messages:
- If you receive a phishing email that's designed to look like it’s from Apple, send it to [email protected]. If you forward a message from Mail on your Mac, include the header information by selecting the message and choosing Forward As Attachment from the Message menu.
- To report spam or other suspicious emails that you receive in your iCloud.com, me.com, or mac.com Inbox, send them to [email protected].
- To report spam or other suspicious messages that you receive through iMessage, tap Report Junk under the message. You can also block unwanted messages and calls.
![Apple Computer Virus Protection Apple Computer Virus Protection](https://cdn.shortpixel.ai/spai/q_lossless+ret_img/https://whatvwant.com/wp-content/uploads/2020/02/Do-Macs-need-Virus-Protection.png?x12936&x12936)
If your web browser displays annoying pop-ups
While browsing the web, if you see a pop-up or alert that offers you a free prize or warns you about a problem with your device, don't believe it. These types of pop-ups are usually fraudulent advertisements, designed to trick you into giving the scammer personal information or money.
Don't call the number or follow the links to claim the prize or fix the problem. Ignore the message and simply navigate away from the page or close the entire window or tab.
If you're prompted to download software
Use extreme caution if you download content from the internet. Some downloads found on the internet may not contain the software they claim to, or may contain software that you didn't expect or want. This includes apps that ask to install configuration profiles that can then control your device. If installed, unknown or unwanted software may become intrusive and annoying and could even damage your Mac and steal your data.
To avoid unwanted, fake, or malicious software, install software from the App Store or get it directly from the developer's website. Learn how to safely open software on your Mac or remove unwanted configuration profiles from your iPhone, iPad, or iPod touch. Software update application mac.
If you get a suspicious phone call or voicemail
Scammers may spoof legitimate company phone numbers and use flattery and threats to pressure you into giving them information, money, and even iTunes gift cards. If you get an unsolicited or suspicious phone call from someone claiming to be from Apple, just hang up.
You can report fraudulent tech support calls to the Federal Trade Commission (U.S. only) at www.ftccomplaintassistant.gov or to your local law enforcement agency.
If you accepted a suspicious Calendar invitation
If you get an unwanted or suspicious calendar invitation in Mail or Calendar, you can report it as Junk in iCloud.
To delete an invitation that you already accepted, tap the event, then tap Decline or Delete Event. If you unintentionally subscribed to a calendar you didn't want, open the Calendar app, tap Calendars and look for an unknown or suspicious calendar. Tap the calendar, then scroll down and tap Delete Calendar.
*To confirm the destination of a link on your Mac, hover your pointer over the link to see the URL. If you can't see the URL in the status bar in Safari, choose View > Show Status Bar. On your iOS device, touch and hold the link.
If you need technical support for a security issue—for example, to reset your Apple ID password or to review a recent iTunes charge—view the Get help with security issues support article or contact Apple Support.
If you have questions or concerns about Apple’s Privacy Policy or data processing, you can ask us about privacy.
How to report a security or privacy vulnerability
If you believe you have discovered a security or privacy vulnerability that affects Apple devices, software, services, or web servers, please report it to us. We welcome reports from everyone, including security researchers, developers, and customers.
To report a security or privacy vulnerability, please send an email to [email protected] that includes:
- The specific product and software version(s) which you believe are affected
- A description of the behavior you observed as well as the behavior that you expected
- A numbered list of steps required to reproduce the issue and a video demonstration, if the steps may be hard to follow
Please use Apple's Product Security PGP key to encrypt sensitive information that you send by email. You can also use Mail Drop to send large files.
You'll receive an automatic reply from Apple to acknowledge that we received your report, and we’ll contact you if we need more information.
How Apple handles these reports
For the protection of our customers, Apple doesn't disclose, discuss, or confirm security issues until our investigation is complete and any necessary updates are generally available.
Apple uses security advisories and our security-announce mailing list to publish information about security fixes in our products and to publicly credit people or organizations that have reported security issues to us. We also credit researchers who have reported security issues with our web servers on the Apple Web Server Notifications page.
Apple Computer Virus Protection Apps
In certain cases, Apple pays rewards for sharing critical security issues. Learn more about the Apple Security Bounty.