With the release of Windows Defender for Mac by the Microsoft virus protection team, Apple’s built-in software got themselves a match, or even a formidable rival. At the moment, it’s only available as a preview for enterprise users, but the Windows Defender download will be rolling out to individuals later this year, packaged into the. Bitdefender Antivirus for Mac is fully compatible with macOS Big Sur (version 11.x) and all new Macs with ARM-based Apple Silicon processors. Is Bitdefender Antivirus for Mac compatible with Apple ARM-based silicon processors M1? Yes, Bitdefender Antivirus for Mac is currently compatible with Apple ARM-based CPUs known as Apple M1.
Mac Defender (also known as Mac Protector, Mac Security,[1]Mac Guard,[2]Mac Shield,[3] and FakeMacDef)[4] is an internet rogue security program that targets computers running macOS. The Mac security firm Intego discovered the fake antivirus software on 2 May 2011, with a patch not being provided by Apple until 31 May.[5] The software has been described as the first major malware threat to the Macintosh platform (although it does not attach to or damage any part of OS X).[6][7][8][9][10][11] However, it is not the first Mac-specific Trojan, and is not self-propagating.
A variant of the program, known as Mac Guard, has been reported which does not require the user to enter a password to install the program,[12] although one still does have to run the installer.[13]
Users typically encounter the program when opening an image found on a search engine. It appears as a pop-up indicating that viruses have been detected on the users' computer and suggests they download a program which, if installed, provides the users' personal information to unauthorized third parties.
The program appears in malicious links spread by search engine optimization poisoning on sites such as Google Image Search.[14] When a user accesses such a malicious link, a fake scanning window appears, originally in the style of a Windows XP application,[14] but later in the form of an 'Apple-type interface'.[15] The program falsely appears to scan the system's hard drive.[14] The user is then prompted to download a file that installs Mac Defender, and is then asked to pay US$59.95 to US$79.95 for a license for the software.[14] Rather than protect against viruses, Mac Defender hijacks the user's Internet browser to display sites related to pornography, and also exposes the user to identity theft (by passing on credit card information to the cracker).[14][16] A newer variant installs itself without needing the user to enter a password.[17] All variants require the user to actively click through an installer to complete installation even if a password is not required.[18]
The software has been traced through German websites, which have been closed down, to the Russian online payment ChronoPay.Mac Defender was traced to ChronoPay by the email address of ChronoPay financial controller Alexandra Volkova.[19] The email address appeared in domain registration for mac-defence.com and macbookprotection.com, two web sites Mac users are directed to in order to purchase the security software. ChronoPay is Russia's largest online payment processor. The web sites were hosted in Germany and were suspended by Czech registrar Webpoint.name. ChronoPay had earlier been linked to another scam in which users involved in file sharing were asked to pay a fine.[20][21]
According to Sophos, by 24 May, 2011, there had been sixty thousand calls to AppleCare technical support about Mac Defender-related issues,[22] and Ed Bott of ZDNet reported that the number of calls to AppleCare increased in volume due to Mac Defender and that a majority of the calls at that time pertained to Mac Defender.[23] AppleCare employees were told not to assist callers in removing the software.[24] Specifically, support employees were told not to instruct callers on how to use Force Quit and Activity Monitor to stop Mac Defender, as well as not to direct callers to any discussions pertaining to the problems caused by Mac Defender.[22] An anonymous AppleCare support employee said that Apple instituted the policy in order to prevent users from relying on technical support instead of anti-virus programs.[24]
AppleCare employees were told not to assist callers in removing the software, but Apple later promised a software patch.[25] On 24 May 2011 Apple issued instructions on the prevention and removal of the malware.[26] The Mac OS X security update 2011-003 was released on 31 May 2011, and includes not only an automatic removal of the trojan, and other security updates, but a new feature that automatically updates malware definitions from Apple.[1]
url=
(help)