Apple drops support document encouraging anti-virus adoption

Share this article:
Apple has taken down its recommendation that Mac OS X users deploy anti-virus technology.

A company spokeswoman said the Nov. 21 support document -- which many believed was the first time ever that Apple had encouraged consumers to use AV software -- was "old and inaccurate."

The note had garnered widespread media coverage.

Some experts speculated that, given the growing sales of Macs, the company was becoming a larger cybertarget, thus necessitating Apple provide some consumer AV guidance. Others opined that the document was a "disclaimer," considering some of the company's commercials bill Mac machines as far superior to those running software from competitor Microsoft.

But Apple, which apparently had been recommending the use of security software as early as 2002, appears to be backing off its recommendations.

"The Mac is designed with built-in technologies that provide protection against malicious software and security threats right out of the box," spokeswoman Jennifer Hakes told SCMagazineUS.com on Wednesday. "However, since no system can be 100 percent immune from every threat, running anti-virus software may offer additional protection."

The release note had suggested users deploy solutions from Intego, Symantec or McAfee. The former two can be purchased via Apple's online store.
Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

AOL Mail hack furthers spam campaign using spoofed accounts

AOL confirmed on Monday that it was aware of the issue and working to remediate the situation.

Backdoors in Wi-Fi routers, said to be closed, can be reopened

Backdoors in Wi-Fi routers, said to be closed, ...

Although said to be patched, researcher Eloi Vanderbeken discovered during the Easter holiday that backdoors existing in certain wireless routers can be reactivated.

Apple ships Mac OS X updates, fixes several code execution bugs

Apple ships Mac OS X updates, fixes several ...

Among the addressed vulnerabilities, was a bug affecting WindowServer, which could allow an attacker to execute malicious code outside the sandbox.