What to do if Mac is poisoned? 4 tips to teach you 100 "poison" not to invade

Will Mac OS be poisoned?

of course. The first thing to admit is that the Mac’s own sandbox mechanism and other rights management mechanisms can indeed effectively isolate threats, but they cannot be completely done. Earlier, because the vast majority of users used Windows systems, the viruses and malicious programs developed by most hackers could only be effective on Windows. In recent years, as the user base of Mac computers has increased, viruses targeting Mac security vulnerabilities have emerged.

1.Mac's "sandbox" mechanism

Since os X 10.6, mac has introduced a sandbox mechanism. The so-called sandbox mechanism is equivalent to giving each APP an independent operating space, and each APP can only run in its own space.
Insert picture description here

2.Mac access control mechanism

The "access control" mechanism of macOS ensures that only trusted software can run on the mac.

Mac's T2 chip

Since 2018, Apple has equipped its newly launched Mac Pro, Macbook Air, Macbook Pro and Mac Mini with the T2 security chip. (To check whether your computer is equipped with a T2 chip, you can choose Apple () menu>"System Information"-""Controller" to check the security chip of the current system.)

The T2 chip can protect the security functions of device keys, stored documents, fingerprint data, system-level applications and startup processes, and also has a microphone anti-eavesdropping function.

Is the golden bell iron jersey invulnerable?

of course not. There are also security loopholes in macOS itself, which can be exploited by criminals.

Take the recent uproarious zoom event as an example. Hackers use the zero day vulnerability to directly enable the mac camera without user authorization. You may be monitored by bad guys at home.

What are the common Mac viruses

Ransomware

Malicious adware

Spyware

Trojan Horse

malicious software

How to diagnose whether your Mac has been poisoned

Mac suddenly slows down and the work window is always stuck

Inexplicable advertising pop-ups

A lot of suspicious content appeared in web search results

Auto restart or auto open application

Your Mac automatically installs some suspicious plugins/applications

How to rescue a poisoned Mac

For old Windows users, if they feel that their computer is poisoned, the first solution will come to mind, which may be to reinstall the system. This method is simple and rude. It is also effective for mac users.

However, what you need to pay attention to is that there are many disk partitions on Windows. Therefore, in general, it is more convenient to format the C drive and reinstall the system. You don't have to worry about file loss. But for mac, reboot may cause mac to become brick, so there is a little risk.

1. Install professional antivirus software

In fact, it is necessary to install anti-virus software on your mac. Some users may also worry whether after downloading anti-virus software, they may also want to install a guard on windows and enter another pit. Adding a pop-up window can't stop.

In fact, as long as you download the security software that has passed the certification channel, you don't have to worry about the above problems. (This specifically refers to Apple's app store.) Because all applications will be reviewed and reviewed by Apple's father, a slight violation of Apple's developer policy or risky software can easily be removed by Apple's father. )

1. Remove all browser plug-ins

The most common mac malware is hidden in the browser extension program.

For the three major browsers on mac, you can try the following:

Safari

1) Open safari

2) Click "Safari" in the status bar at the top -> select "Safari Extension"

3) Check the list of installed safari extension programs to confirm whether there are suspicious extension programs. Generally, there will be related descriptions for normal expansion procedures. If the extension program was not installed by you, please delete the related extension program.

4) Check one by one and delete one by one until all suspicious plug-ins are removed.

Chrome

Open Chrome and click the "..." button in the upper right corner to select "More Tools"-"Extensions". In this list, you can see all installed chrome plug-ins. If you find suspicious, you can remove it immediately.

Firefox

Open Firefox and click "|||" in the upper right corner, select plug-ins, select unwanted plug-ins, and remove them.

2. Delete all suspicious applications

If you download a suspicious application, please uninstall it immediately. Otherwise, it may bring security risks.

When you don't know what program is suspicious, you may need to manually open the system activity monitor -> view the current running process and its resource usage. (Similar to Windows Explorer)

When you find that a suspicious program is occupying running resources, please end its process without hesitation, find the program, and drag it into the trash.

3. Create a new user profile

Usually, the virus is tied to a certain user profile. In this way, they can gain control of the administrator user. Because of this, you can consider creating a new user profile on your Mac, and then transferring personal information from one user profile to another.

Menu Bar-"System Preferences-"Select "Users and Groups"

a) Click the "" button, and then type your administrator password.

b) Click + to add user profile.

c) Then move the data under one user's file to another user, you need to use the shared folder.

d) Click "Visit"-"Access Folder"

Paste /Users

e) Then in the state of sharing files, move one user profile to another user profile.

4. Prevention is very important

For any problem, preventing it in the first place is faster and effective than trying to find a remedy after the Dongchuang incident. In daily use, please be sure to:

a) Do not browse the website (here the otaku straight man understands self-understanding)

b) Do not click on links from unknown sources.

c) Do not install unconfirmed programs.

d) Regularly check and kill the mac.

In addition, there is a time machine in macOS, which can help back up data in macOS. When a problem is found, the time machine can be used to restore the system and data.

As mentioned above, it is not easy for normal mac users to be poisoned.

Guess you like

Origin blog.csdn.net/u014306892/article/details/111768451