The latest update is getting a lot of news today. The security vulnerability can allow attackers to take full control of your device. Info from Apple Support is here. Apple security updates
The latest versions are...
The latest versions are...
CVE-2022-32893 is fixed with Safari 15.6.1 on macOS Big Sur and macOS Catalina. CVE-2022-32894 is the kernel vulnerability. It's not entirely clear but so far it seems to be Monterey-only.There's no mention on the security vulnerability of older versions of the OS. I have to assume that they're vulnerable as well, but there seems to be no options for those of us that can't upgrade to the latest OS.
That's why I'll never buy another Mac. This built in obsolescence is outrageous.
Well, first, that's not true. There are plenty of third party anti-virus utilities that will protect you from any exploit in the wild for the Macintosh. There are even entirely free ones. So you are flush with options.There's no mention on the security vulnerability of older versions of the OS. I have to assume that they're vulnerable as well, but there seems to be no options for those of us that can't upgrade to the latest OS.
Well, best of luck to you finding an operating system and computing platform better than the Macintosh. I'm sure that we will all miss you. Please write now and then and tell us all about how much better your (different) computer is. I'm sure that we would all be fascinated to hear about what that better computer is.That's why I'll never buy another Mac. This built in obsolescence is outrageous.
Let me suggest that you try this free utility:... when I try to install what is presumably the latest Security Update for this OS, 2020-006, it won't complete & tells me this update is no longer recommended.
I'm extremely leery of MalwareBytes since they came out with the nagware/commercial version. Download:Lastly, I'd appreciate your suggestions for free AV software. I've been using free Malwarebytes but it tells me its updates are not current & "Check for Updates" does nothing. Scanning still works but it worries me I'm out of date to threats.
SilentKnight checks to see if you have the latest Apple security update installed, and if you don't, you can download and install it right from within the program.
Well...hmmm...think about it. You're using a free utility. So they aren't making money from you paying for the utility. How might they be making their money? Might it be the same way that Google makes their money from their free utilities? Might those 24 files be doing something like...spying on you?I’m not sure if a user should use more than one malware checker. MWB seems to work free. Should I care what those 24 pieces are doing? I mean, it’s overreach but so what? (FAF found 24!)
EasyFind is free, not donationware. But, yes, they do the same thing. The point isn't that you specifically need EasyFind, but that I was suggesting that you use something that will search everywhere on your hard drive. Spotlight won't suffice at it only searches where Apple wants you to be searching.Doesn’t EasyFind do the same job as Find Any File? (Also donationware.)
Randy,Well, first, that's not true. There are plenty of third party anti-virus utilities that will protect you from any exploit in the wild for the Macintosh. There are even entirely free ones. So you are flush with options.
Second, even if you have an older Mac, and even if it has a potential vulnerability that isn't patched, it's highly unlikely that you are going to see an exploit for that vulnerability.
Here’s the thing. Modern malware is almost exclusively written for financial gain. (With the odd bit of malware written to target a particular socio-political group, usually in the far east. These exploits usually aren’t seen in the west.) Whether it is to serve up ads, or to scam users out of their money, it is all about a profit motive.
In addition, modern malware tends to take a significant amount of time and money to write. The Mac isn’t easy to write malware for, and when a potential vulnerability in the Mac is found, the bad guys have to strike as quickly as possible before it is patched. But “striking quickly” usually still means that it will take months to push out a new exploit, representing a large investment in time and money.
Also, since it apparently has proven to be exceedingly difficult to write actual viruses (i.e. self-propagating/diseminating malware) for the Mac, any malware written for the Mac will almost certainly be a Trojan Horse that will be very difficult to disseminate to a large audience before it is discovered and shut down.
So, the bad guys are looking for potential vulnerabilities that Apple doesn’t know about, which are likely to go unpatched for many months into the future, they want any exploit that they write to have the maximum number of potential victims, and they want to be able to reach as many of those victims as possible, as quickly as possible. This is all a difficult feat.
Presumably, even if older versions of the Mac OS are just as vulnerable to a newly discovered potential vulnerability in the Macintosh as newer Macs are, once the majority of newer Macs have been patched, it will become uneconomical for the bad guys to target this vulnerability. By the time that the bad guys are able to push an exploit out, there will be way too few potential targets left to infect to be able to recoup the investment of time and money they put into creating the exploit.
At least that's the way that it has tended to work out in the past. Owners of old Macs haven’t been beset by unpatched-against malware. Estimates of the numbers of users still using older versions of the Macintosh OS tend to show that there are surprisingly few users of versions that are so old that they no longer receive any security updates from Apple.
Global macOS version market share 2018-2021 | Statista
So, older Macs by themselves simply aren’t a viable target for malware writers. And existing malware that can no longer effectively target recent Macs tends not to remain in the wild because it can’t self-replicate/disseminate, so it isn’t a significant threat to older Macs.
If it does occur that there is a bit of malware in the wild that is patched in newer Macs, but which is still going around infecting older Macs (and this has been the case years ago), it’s extremely likely that someone in the Macintosh community will come up with a free patch (which, once again, was the case in the past).
As long as Apple remains fairly diligent about patching against security vulnerabilities in the most recent versions of the Mac OS, the entire Macintosh community should remain safe due to a sort of “herd immunity” effect.
Well, best of luck to you finding an operating system and computing platform better than the Macintosh. I'm sure that we will all miss you. Please write now and then and tell us all about how much better your (different) computer is. I'm sure that we would all be fascinated to hear about what that better computer is.
Randy, I'm not sure I understand this criticism. It's perfectly easy to continue to use Malwarebytes for free without hassles. It's a supported use case, and not one that we have any intention of ever changing.I'm extremely leery of MalwareBytes since they came out with the nagware/commercial version.
I can easily tell you what they're doing, if you had asked.and do a search for "MalwareBytes" on your Mac if you have MalwareBytes installed. You will find as many as 24 files (the number, oddly, varies for each user) for MalwareBytes installed all over your system. What do you think that they are all doing? I'd use EasyFind to delete all traces of MalwareBytes from your system.
No. They are not. Randy, please stop this kind of nonsense. Malwarebytes absolutely does not sell or in any other way monetize data from users. You can easily read our privacy policy and find out what we're collecting and why, and as someone who hates data collection and strongly advocates against collection of anything we don't truly need, I can tell you there's nothing sneaky there. If we started doing the same things with data collection that Google and Facebook do, we'd lose large numbers of employees who strongly dislike those practices.Well...hmmm...think about it. You're using a free utility. So they aren't making money from you paying for the utility. How might they be making their money? Might it be the same way that Google makes their money from their free utilities? Might those 24 files be doing something like...spying on you?
+1. I completely agree.Randy, I'm not sure I understand this criticism. It's perfectly easy to continue to use Malwarebytes for free without hassles. It's a supported use case, and not one that we have any intention of ever changing.
Thank you for your valid comments and welcome to ehMac.ca forums.If anyone has questions about what any Malwarebytes file is doing, just ask. I'll answer.
I find it quite interesting, or should I say frustrating if not hypocritical, why and how some "free" applications or utilities are labelled as trustworthy by some while other applications are not, with no qualifications included or added regardless of judgement.No. They are not. Randy, please stop this kind of nonsense. Malwarebytes absolutely does not sell or in any other way monetize data from users.
Thanks!Thank you for your valid comments and welcome to ehMac.ca forums.
Yeah, it's a catch-22. In order to make money, free products have to: 1) ask for donations (or something similar), 2) display advertising of some kind, or 3) monetize user data. Or, of course, 4) not make money. Some great folks make really great free tools out of the goodness of their hearts, without looking to earn any money from them, in the great spirit of the good old days of the internet, but that's more and more rare these days.I find it quite interesting, or should I say frustrating if not hypocritical, why and how some "free" applications or utilities are labelled as trustworthy by some while other applications are not, with no qualifications included or added regardless of judgement.
And in the same breath by the same commenters, if a developer dares charge a few dollars for his utility, such commentators suggest there is another similar product available that is "free", making it supposedly a better choice being the implication.
II thought that my concerns were clear, and they really have nothing to do with whether or not Malwarebytes is free. The free vs. pay argument sounds to be purposely obfuscating the issue that I was pointing out.Randy, I'm not sure I understand this criticism. It's perfectly easy to continue to use Malwarebytes for free without hassles.
The very fact that Malwarebytes has components that are running outside and separate from the main program itself, thus requiring a special uninstaller program to remove them, seems very disturbing to me.For others reading, if you have Malwarebytes installed and you decide to remove it, please don't do it this way. This is nothing against EasyFind, which is an excellent tool for finding things... but it is absolutely NOT the right tool for uninstalling software. Instead, use the Malwarebytes uninstaller, which will properly remove everything, ensuring that any actively running Malwarebytes processes are terminated without requiring a restart.
Randy, these were your own words, which I was addressing:II thought that my concerns were clear, and they really have nothing to do with whether or not Malwarebytes is free. The free vs. pay argument sounds to be purposely obfuscating the issue that I was pointing out.
You implied that, because we offer a free product, that we must be spying on you. These were your words, part of your argument, and I have every right to defend my product against such false claims.Randy B. Singer said:
Well...hmmm...think about it. You're using a free utility. So they aren't making money from you paying for the utility. How might they be making their money? Might it be the same way that Google makes their money from their free utilities? Might those 24 files be doing something like...spying on you?
Are you, perhaps, familiar with Zoom? Or maybe Adobe Photoshop? Maybe Microsoft Office? These are simply a few examples from among countless other apps that also have "components that are running outside and separate from the main program." This is far from unusual and is not, in and of itself, in any way disturbing. It is the way that countless third-party programs for macOS have worked for decades. Almost since the very earliest days of the Macintosh, in fact.The very fact that Malwarebytes has components that are running outside and separate from the main program itself, thus requiring a special uninstaller program to remove them, seems very disturbing to me.
So, wait a minute here... you're saying that someone who made me aware of the things you were saying about me and my product behind my back is a "weasel?" When I show up here to defend myself, you get mad, thinking that someone told me what you were saying, and then accuse me of lying? That's rich, Randy. I'm disappointed.There are, of course, weasels who would invite someone like you here to argue over this, and speak out of both sides of their mouth. Other list members should take note of this.
Exactly. Many folks DO have those same concerns about those programs. In fact, when Covid hit and Zoom became extremely popular overnight, folks leveled a lot of criticism at Zoom for being extremely suspect with regard to security. In response, and seeing the need to become more trustworthy during the crisis, Zoom quickly re-engineered it's platform to be less invasive and more trustworthy. (Many folks STILL have their doubts about how trustworthy Zoom is.)What exactly is your concern here, and why are you not leveling that same concern at Zoom, Adobe, Microsoft, and countless others?
Oh yes, he is most definitely a weasel. He's outed himself to everyone here. (But from what I'm hearing, it's not a huge revelation.)So, wait a minute here... you're saying that someone who made me aware of the things you were saying about me and my product behind my back is a "weasel?"