Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
I have a mid 2010 5.1 Mac Pro that has served me wonderfully since new. The only real changes have been more ram, added SSD and a Metal enabled graphics card, so it can run Mojave. Last year I bought a new mini and the Mac Pro has become the backup machine, though still in regular use.

I have some concerns going forward about the security risks on these old machines, given that Apple will likely stop security patches for Mojave in a few months, but I look around and seem to be in a minority thinking about the security risks on these older computers. Many are updating to newer OS versions using unofficial patches, however I gather that also entails compromises and even with Mojave I cannot enable file vault like I have on the mini. Another point is that Intel has not updated the microcode on these machines for quite a while now.

Some are using even older Mac Pros that are still running El Capitan with the outdated TLS version in Mail and seemingly oblivious to any risks. Perhaps I am being a little paranoid, but these days we keep so much information on our computers and I question the continued wisdom of using such old computers.

My original plan was to use the Mac Pro purely as an offline production machine for certain tasks, but I wonder how practical that is in reality. The work I do makes it more or less essential to have a second computer and it's very useful synching work data over iCloud, so you don't want any weak links. The irony is that I could theoretically run Windows 10 with all the latest patches but that would make it much less useful to me.

Any thoughts on the continued safe use of these older Mac Pros?
 
  • Like
Reactions: m4v3r1ck

mystery hill

macrumors 65816
Apr 2, 2021
1,061
3,994
Do you mind storing unencrypted data on the Mac Pro? If you don't mind the risk that it's stolen and someone attempts to access information, then it should be fine to continue using it.

You could use third-party software for encryption but that wouldn't be as seamless as FileVault.
 

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
I think the risk of somebody physically taking the computer from the property is very low. My greater concern was more about online access through some weakness, possibly just landing on a web page with something nasty and I read about certain web banners containing malicious code a while back.

There was somebody on Facebook a few days ago in the Mac Pro upgrade group, who woke up one day and found the console as well as the desktop sharing app open on his desktop, so he had to assume there had been some kind of intrusion overnight, but he doesn't know what they copied or indeed if they have injected some kind of spyware, so in situations like that the risk possibilities are huge. He had apparently used some patch that allowed an old Mac Pro to run Mojave.

In my case file sharing and remote desktop access is denied in system preferences, but who knows what other routes might be available if you are running an outdated OS. It's not something I hear discussed that often though.
 

mystery hill

macrumors 65816
Apr 2, 2021
1,061
3,994
possibly just landing on a web page with something nasty and I read about certain web banners containing malicious code a while back.
That's a possibility.

You can take the usually recommended steps to help with securing the system:
Disable file and remote desktop access.
Only download software from the App Store or from trusted websites.
Ensure your browser is updated to the latest version. This is easy if using Chrome as it updates automatically.
Use an ad-blocker.
Don't visit suspicious sites.

As Macs aren't as popular as Windows, there isn't as much malware targeting macOS - although there has been an increase recently.

You could try running a newer version of macOS that isn't officially compatible with the Mac Pro model, or using Windows.
 

MarkC426

macrumors 68040
May 14, 2008
3,699
2,097
UK
Without putting down OpenCore or Dosdude patcher, personally I would not patch (or hack) my Mac.

Although many people do, and run the latest OS, I see umpteen posts about 'this not working, or that won't connect etc'. This is what happens when you run something not supported.... ?

Plus, who knows what the patcher is doing in the background, as it's not from Apple.
 

Weisswurstsepp

macrumors member
Jul 25, 2020
55
63
I have a mid 2010 5.1 Mac Pro that has served me wonderfully since new. The only real changes have been more ram, added SSD and a Metal enabled graphics card, so it can run Mojave. Last year I bought a new mini and the Mac Pro has become the backup machine, though still in regular use.

I have some concerns going forward about the security risks on these old machines, given that Apple will likely stop security patches for Mojave in a few months, but I look around and seem to be in a minority thinking about the security risks on these older computers. Many are updating to newer OS versions using unofficial patches, however I gather that also entails compromises and even with Mojave I cannot enable file vault like I have on the mini. Another point is that Intel has not updated the microcode on these machines for quite a while now.

As it happens I'm typing this on a single processor Mac Pro 5,1 running Big Sur 11.2.3 on a 1.6TB Micron NVMe drive with FileVault enabled. All I had to do was installing OpenCore on the SSD, which took me less than 30 minutes (and with OCLP it shouldn't even take much more than 10 minutes). Big Sur is native as it's released by Apple, so I can just install regular updates as they come from Apple with no need to patch the OS.

Of course the MP 5,1 lacks the T2 chip and the "secure enclave" but my data on the disk is as secure as it can be.

Any thoughts on the continued safe use of these older Mac Pros?

Older hardware is sufficiently safe for most users if you put mitigations in place (for the MP 5,1 this would include disabling HyperThreading). The security issues found in older intel XEONs aren't easy to exploit and there haven't been any attacks using them in the wild that I'm aware of.

That leaves the software. As you said, running older Mac OS versions which are no longer updated is risky, and because software (often combined with phising) is the entry vector for pretty much all of the malware infections it's important that the installed software is patched and kept current.

For a MP 5,1 the easiest way is to upgrade to the current Mac OS version which is Big Sur.

Keep in mind that there is a lot more to IT security than an updated OS (the most important factor in any security chain is the user), but it means your MP 5,1 is roughly at a same security level as a newer Mac.
 

qoop

macrumors 6502
Feb 4, 2021
440
424
THE UNITED KINGDOM
I've got ten 12 core machines running Sierra. The security is what it is I suppose. None of them can be upgraded beyond their current state. They still work well but are due to be replaced at the end of the year.
 

dominicperry

macrumors member
Jun 6, 2020
54
28
Run anti virus and anti malware programs. Personally I use Avast, which is free and Malwarebytes, which I also use the free version of - but you have to remember to run it regularly. I would probably pay for the real-time scan version if I was using an older OS.
 

Weisswurstsepp

macrumors member
Jul 25, 2020
55
63
Run anti virus and anti malware programs. Personally I use Avast, which is free

You mean like the Avast who got caught selling user data?

https://www.cnet.com/news/antivirus-firm-avast-is-reportedly-selling-users-web-browsing-data/

If you really must rely on antivirus software (which is mostly snake oil and more likely to add to the attack surface than protecting your system from malware) then ESET is probably the best option here, as it's less intrusive than others and has better detection ratios than the other ones. But that's payware.
 
  • Like
Reactions: m4v3r1ck

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
Of course the MP 5,1 lacks the T2 chip and the "secure enclave" but my data on the disk is as secure as it can be.

Actually you raise a good point there. I bet Apple are itching to make T2 a locked in requirement for system updates though I think they'll have to hold off for another year or so.
 

Weisswurstsepp

macrumors member
Jul 25, 2020
55
63
Actually you raise a good point there. I bet Apple are itching to make T2 a locked in requirement for system updates though I think they'll have to hold off for another year or so.

Most certainly, but it's highly unlikely they would introduce a T2 requirement in an existing macOS version like Big Sur, and there's a good chance that it would only be introduced for Apple Silicon based Macs (which all come with T2) and not for x86 Macs (which are on their way out anyways).

In any case, Big Sur is probably a good last OS for the cMP, and it should be good for at least another two years.

After that it would have to be Windows 10 or Linux I guess.
 

Macsonic

macrumors 68000
Sep 6, 2009
1,709
100
I have a mid 2010 5.1 Mac Pro that has served me wonderfully since new. The only real changes have been more ram, added SSD and a Metal enabled graphics card, so it can run Mojave. Last year I bought a new mini and the Mac Pro has become the backup machine, though still in regular use.

I have some concerns going forward about the security risks on these old machines, given that Apple will likely stop security patches for Mojave in a few months, but I look around and seem to be in a minority thinking about the security risks on these older computers. Many are updating to newer OS versions using unofficial patches, however I gather that also entails compromises and even with Mojave I cannot enable file vault like I have on the mini. Another point is that Intel has not updated the microcode on these machines for quite a while now.

Some are using even older Mac Pros that are still running El Capitan with the outdated TLS version in Mail and seemingly oblivious to any risks. Perhaps I am being a little paranoid, but these days we keep so much information on our computers and I question the continued wisdom of using such old computers.

My original plan was to use the Mac Pro purely as an offline production machine for certain tasks, but I wonder how practical that is in reality. The work I do makes it more or less essential to have a second computer and it's very useful synching work data over iCloud, so you don't want any weak links. The irony is that I could theoretically run Windows 10 with all the latest patches but that would make it much less useful to me.

Any thoughts on the continued safe use of these older Mac Pros?
In my opinion, if using either an older OS or new OS with security updates, we still need to be vigilant in managing these malwares or ransomwares. As far as I’m aware, malwares are generally sent via email as phishing emails to lure users. Human intervention would be needed to screen out these suspicious emails. A friend of mine, her credit card got hacked even when the office where she works uses the current OS with security update support. She believes it’s one of the phishing emails she received.

 

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
Clearly we need to avoid clicking on dangerous links whatever system we are using, but sometimes malware is simply hidden on webpages, so I think it comes down to points like not having the T2 processor, FileVault or very importantly security updates. There was one a few days ago for Mojave like for Big Sur, however those will stop when the next OS comes out in a few months.

Installing Big Sur via OpenCore has been suggested, however I read comments from Mac Pro users on Facebook saying how 11.3 was causing problems and to stick with 11.2. To my mind that kind of uncertainty with updates is not really viable in a production machine.

More positively I have taken some proactive steps to learn more about modem and router security that resulted I buying new equipment. In broad terms it means switching off all those features that are often unused, yet enabled by default creating vulnerabilities. Some routers have built in anti virus software, while it's free to make use of custom DNS like Quad9 that stops you inadvertently accessing or downloading content from the vast majority of dangerous web pages.

These are steps you should take with any computer, but especially important with an older one. Another suggestion would be to place the older computer on a guest wifi account so it does not spread anything nasty to the local network if it does become infected. You might want to exclude it from any shared iCloud content as well.
 

m1maverick

macrumors 65816
Nov 22, 2020
1,368
1,267
Clearly we need to avoid clicking on dangerous links whatever system we are using, but sometimes malware is simply hidden on webpages, so I think it comes down to points like not having the T2 processor, FileVault or very importantly security updates. There was one a few days ago for Mojave like for Big Sur, however those will stop when the next OS comes out in a few months.

Installing Big Sur via OpenCore has been suggested, however I read comments from Mac Pro users on Facebook saying how 11.3 was causing problems and to stick with 11.2. To my mind that kind of uncertainty with updates is not really viable in a production machine.

More positively I have taken some proactive steps to learn more about modem and router security that resulted I buying new equipment. In broad terms it means switching off all those features that are often unused, yet enabled by default creating vulnerabilities. Some routers have built in anti virus software, while it's free to make use of custom DNS like Quad9 that stops you inadvertently accessing or downloading content from the vast majority of dangerous web pages.

These are steps you should take with any computer, but especially important with an older one. Another suggestion would be to place the older computer on a guest wifi account so it does not spread anything nasty to the local network if it does become infected. You might want to exclude it from any shared iCloud content as well.
T2 and FileVault are protections for data at rest before the OS is started. Once the system has been started and operational they're effectively useless. Security updates and user vigilance are still the primary means to keep a system secure.
 
  • Like
Reactions: Weisswurstsepp
Keep in mind that the biggest surface for most users exploits by far, is the web browser.

Both Chrome and Firefox have demonstrated a willingness to continue supporting their browsers on older OS X releases. For example, the current version of Chrome supports "OS X El Capitan 10.11 or later" and Firefox has their "Extended Support Release" which still supports as far back as 10.9 Mavericks.

Chrome and Firefox use their own SSL libraries as far as I know, and often their own libraries for JPEG*, etc. I would feel reasonably confident using Firefox ESR on a system as old as 10.9.

*Chrome and Firefox are often said to use more battery life on laptops, etc. One reason for this is because they choose to use their own libraries for many common functions such as JPEG, PNG decoding, etc. The built in OS libraries are a bit more optimized compared to the generic libraries that those browsers ship. But this also means you will benefit from the libraries being newer compared to the OS libraries, when you are running a technically "unsupported" version of the OS.
 

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
That's a good point actually and Brave would likely be a good option as well. Safari has always been my browser of choice, however an alternative browser would seem like the better way forward. I do a bit of web design work and years ago we used to run browser detection scripts advising site visitors that internet explorer was no longer supported. They included a message advising visitors to use a more modern and secure alternative like Chrome or Firefox.

Along similar lines, I remember when my web host stopped supporting the older TLS version included in a previous iMac with Mail in El Capitan. The only way to keep using it for email would have been with Thunderbird. In that case the computer had become really slow and most modern software was no longer compatible with the old OS, so I basically ran out of options.

No doubt many realise their OS is no longer being updated, but after a couple years when the security updates stop coming Apple could do worse than advise those users it was no longer as safe and they should update their OS. At that point at least the user is informed.
 

Weisswurstsepp

macrumors member
Jul 25, 2020
55
63
Clearly we need to avoid clicking on dangerous links whatever system we are using, but sometimes malware is simply hidden on webpages, so I think it comes down to points like not having the T2 processor, FileVault or very importantly security updates. There was one a few days ago for Mojave like for Big Sur, however those will stop when the next OS comes out in a few months.

As m1mavrerick already said, FileVault and T2 are for data at rest and once they are unlocked become pretty much useless to protect anything (the protection returns when the device is locked again, though).

Besides, it's only a matter of time until a security flaw will be found in the T2 processor (in complex devices like these it's inevitable) and then pray that Apple can actually fix it through software and it's not something in the actual hardware like on older iPhones which is pretty much unfixable.

Installing Big Sur via OpenCore has been suggested, however I read comments from Mac Pro users on Facebook saying how 11.3 was causing problems and to stick with 11.2. To my mind that kind of uncertainty with updates is not really viable in a production machine.

That is true, however this only affects Mac Pros which use NVMe storage (support which was retrofitted by Apple in one of the last firmware updates for the cMP before it became obsolete), if SATA storage is used it seems to work fine. Also, it appears that the same issue affects some Macs that are fully supported, so it looks it's just another bug in Apple's OS than something inherent in the cMP.

On the other hand, it's not uncommon for Apple to bork a mac OS update so you'd have to be insane to install the latest OS variant on a production machine just days after release, supported Mac or not. If you can't afford downtime then it's much better to let others take the first plunge and wait for a week or so to see if others have encountered problems.

Which is for example why I haven't even tried updating my cMP from 11.23 to 11.3 (I have now upgraded my other unsupported Macs, and the update ran fine).

More positively I have taken some proactive steps to learn more about modem and router security that resulted I buying new equipment. In broad terms it means switching off all those features that are often unused, yet enabled by default creating vulnerabilities. Some routers have built in anti virus software, while it's free to make use of custom DNS like Quad9 that stops you inadvertently accessing or downloading content from the vast majority of dangerous web pages.

While disabling unused functionality is certainly a god thing, it's unfortunately not that simple.

First of all, pretty much all consumer-grade routers are crap, some more some less but at the end it's all the same. It doesn't really matter if you buy a Gung-Ho-Chin noname device from Aliexpress or one of the horrible expensive routers like the ones from Asus. You still get a device made primarily for the lowest cost possible, you still only get an old-style SPI firewall as if it was still 1996 when blocking ports was still enough, and fixes for bugs and security holes may or may not come in a timely manner (or, as it is quite often, not at all). You don't get stuff that really improves safety such as NGFW (Next Generation Firewalls) which can not just block ports but also protocols or gateways which can do DPI so they can look into encrypted and non-encrypted traffic and filter out any harmful content, because that's business class stuff which is notably more expensive (and the services are subscriptions which are paid for annually). But then, it would be naive to expect a $150 dollar plastic WiFi router to offer the same, so here you go.

As to custom DNS like Quad9, all it protects you from is if you type in the URL of a dangerous website (like one of the many fake sites that use typos of common names like ebay to catch people that mistyped the URL). It does exactly nothing to prevent malware that pops up on legit websites (for example through ad networks or because the site was hijacked), and it does nothing to prevent any malware you might have catched to contact their C&C (command and control) servers because they normally don't use URLs but direct addressing via IPs, thereby circumventing any DNS measure you might employ.

IT security is very hard, and worse it's a constant process of adapting and changing, which is why being a IT security specialist is a very well paid job these days.

As a consumer with limited knowledge and budget, all you can do is to keep your machines and especially browsers updated, use an ad blocker (which by blocking ads also blocks one of the biggest sources of malware), maintain some vigilance and hope for the best.
 
Last edited:
  • Like
Reactions: KeesMacPro

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
That's good to know about 11.3 only affecting NVMe, since mine has two SSD drives with one being PCIE, while the other is SATA. Nevertheless I had no problems with my Mac mini, which has an NVMe drive. The point remains that trying to update a current OS on hardware that was deliberately excluded by Apple is inherently more risky.

I read up quite a bit about routers and modems, most of which concurred with your view that consumer level products are pretty awful. Worse still, many will think options like ALG, WPS and UPnP are good without realising they are leaving the door open to greater risk.

One way or another I have managed to muddle along for over 20 years on Macs without ever having any security issues that have caused problems, so I don't want to sound overly paranoid, but equally I think there are a lot more online threats out there nowadays and we all need to be cautious. Mac owners can be a bit blasé and assume that only Windows users are at risk.
 

iluvmacs99

macrumors 6502a
Apr 9, 2019
920
673
Malwarebytes is pretty good in securing the holes left by the lack of Intel and Apple support on my Mac Pro which is running High Sierra. I also have a security router that scans the internet traffic through Trend Micro. In fact, last year, it caught a website that had malware and stopped the internet traffic while Malwarebytes caught it and disinfected it. So having Trend Micro and Malwarebytes protection on all my Macs and PCs give me a good piece of mind. I also create an external offsite backup of my Mac Pro just in case Trend Micro and Malwarebytes failed to protect my Mac Pro. So far so good.
 
Last edited:

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
Yes I've done the same thing using a router that has anti virus through Trend Micro and did actually wonder if it is any good. It's one of those deals where it is free for three years when you buy a router, then you have to pay for a subscription at which point I suspect most either ignore it or buy a new router.

The offsite backup sounds good, however it doesn't protect you in the sense that if an intruder has gained entry somehow and accessed your data they likely have it anyway. In many cases the aim is not to vandalise your data but copy it and make use of it for nefarious means.

The first time I really thought about this was after reading a web design forum message where a guy woke up bleary eyed in the middle of the night to see the screen of his old laptop had switched on and when he looked closer he saw the mouse cursor was being moved around the screen remotely.

A few months later I read the story of the old Mac Pro owner on Facebook mentioned in my second post and in either case you are left wondering just what kind of events you could be dealing with over the following months or years and in both these cases they at least knew there has been an intrusion, so they could inform banks and race to change passwords etc. I always use 1Password with a unique random password for each site, avoiding use of the keychain.
 

iluvmacs99

macrumors 6502a
Apr 9, 2019
920
673
When I was working for a non-profit tech recycling company prior to the pandemic, I was working in a division where we are responsible for cyber security and helping educate our community about cyber security. Suffice to say, I had seen my fair share of **** shows in regards to malware and ransomware.

My advice to you and to anyone then in regards to virus and malware security is really simple.

"Do onto others what you want others to do on to you".

Many times when I worked with clients in our non-profit tech company, the majority of my clients are people who are fighting against some particular causes, like exposing corruption on governments, messing with the NSA and exposing things on corporations. They are basically journalists and or activists and while they did employ highly sophisticated security systems on their computers and paid I.T cyber security experts top dollar, the majority of them got hacked and as you had described, those things are true about hackers. Intrusions do happen, but they always happen for a reason.

Meaning that in my experience, hackers don't spend a lot of time and effort to hack you and your company. There is ALWAYS a reason for their hacks and is usually applied with the same standard and measure as what you or your company did to other people. Sort of like; what comes around goes around.

I applied a higher security standard on my systems than most Mac and PC users out there, because I do work with people and individuals who do work to expose certain injustices in our society and as thus expect retributions and attacks from individuals who do not like what we do and what we represent. I won't elaborate further, but for me, it comes with the job and I do expect attacks which I did get in relation to our effort to expose them.

What you need to do is measure your threat scenario. Are you likely to step repeatedly on someone's else foot and get them upset, angry and vindictive or are there something that you might likely do to others that others will more likely pay back through cyber attacks? You want to improve security not out of paranoia or what you hear out there, but rather on your own threat level and your company's threat level and apply security the best you can.

Even with top paid security, it can not prevent people who are intent to intrude into your Mac Pro or even any of your modern machines with the latest gate keeper, as there is no such thing as a perfect and impervious security system. What you can do is reduce your chances of being hacked and your data being copied and then be held ransom like what happened to Quanta and the yet unreleased new Macbook Pro drawings.

I am aware that Apple had done certain injustices to certain individuals and you know what, if Apple does these injustices to others, then what is stopping others doing the same injustices to Apple either directly or indirectly? You can build up your system like Fort Knox, but that's just likely slowdown the intrusion and not prevent it. No one can get away from inflicting injustices on others in business and not get hit back in some way.
 
Last edited:

m1maverick

macrumors 65816
Nov 22, 2020
1,368
1,267
Yes I've done the same thing using a router that has anti virus through Trend Micro and did actually wonder if it is any good. It's one of those deals where it is free for three years when you buy a router, then you have to pay for a subscription at which point I suspect most either ignore it or buy a new router.

The offsite backup sounds good, however it doesn't protect you in the sense that if an intruder has gained entry somehow and accessed your data they likely have it anyway. In many cases the aim is not to vandalise your data but copy it and make use of it for nefarious means.

The first time I really thought about this was after reading a web design forum message where a guy woke up bleary eyed in the middle of the night to see the screen of his old laptop had switched on and when he looked closer he saw the mouse cursor was being moved around the screen remotely.

A few months later I read the story of the old Mac Pro owner on Facebook mentioned in my second post and in either case you are left wondering just what kind of events you could be dealing with over the following months or years and in both these cases they at least knew there has been an intrusion, so they could inform banks and race to change passwords etc. I always use 1Password with a unique random password for each site, avoiding use of the keychain.
I tend to separate my important data on a computer other than the one I use to access the Internet. I realize such measures may not be preferred or practical for a lot of people. For those people I recommend applying the latest security updates / patches. This is, IMO, one of the best things you can do to reduce risk of compromise. Another is to be vigilant about e-mails which ask you to open or run something, even if they're from someone you know, especially if it's out of the ordinary for them to send you something unsolicited. The same applies to things you download through a browser. Make sure you know what you are downloading and from where (I set up a VM for things which I am unsure of and test it out first).

AV is OK for catching known things but it's easy to modify shell code to bypass AV so don't rely on it too much.

In the end keeping current on updates / patches and being aware are some of the best things you can do to protect yourself but things do happen. If someone compromises your system they're likely looking to encrypt everything (ransomware) and demand crypto currency payment or use your system as a member of some bot network to perform nafarious activities against others (or mine crypto currency). IMO, for most people, compromising your personal data would come third on the list.
 

ashleykaryl

macrumors 6502
Original poster
Jul 22, 2011
491
218
UK
@iluvmacs99 In my case I doubt I am courting anything very controversial. It's mainly just web design for small businesses and most of my clients struggle to even add an email account, let alone hack into systems.

On a general level I am very cautious about scammers, ransomware and that sort of thing where criminals will target anybody and everybody to steal whatever they can. I have particular contempt though for those who target the elderly and vulnerable with no scruples whatsoever.

@m1mavrerick That's probably a very good strategy having two computers and separating data like that. It might be considered expensive, requiring a second computer and not always practical depending on the kind of work you do but it certainly makes sense.
 

iluvmacs99

macrumors 6502a
Apr 9, 2019
920
673
@iluvmacs99 In my case I doubt I am courting anything very controversial. It's mainly just web design for small businesses and most of my clients struggle to even add an email account, let alone hack into systems.

On a general level I am very cautious about scammers, ransomware and that sort of thing where criminals will target anybody and everybody to steal whatever they can. I have particular contempt though for those who target the elderly and vulnerable with no scruples whatsoever.
I personally look at security in the vantage point of running a business as an insurance policy. Most small businesses don't factor in network security on their very high threat list, due mainly to the risk/cost basis, which wouldn't allow them to see immediate payback on a recurring cost basis for that particular investment in security and thus where common intrusions usually get exploited by hackers. Hackers always look at specific vector of attacks and finding the weakest link in the network chain to introduce, plant malware and then re-plant ransomware to the target host. The most common error of thinking I found working in cybersecurity for awhile with clients is the thinking that, the clients like yourself worry that the hackers may target you. And so with prudent caution, the clients would beef up their computer security only to protect themselves. But don't you see the flaw in this thinking? Wouldn't the hacker know that? Exactly my point. Hackers know cautionary people tend to beef up their computer systems like Fort Knox. But these same cautionary people have friends and families and business colleagues right? They communicate with them right? So how do you circumvent Fort Knox? By targeting the weakest link that has a secure trust entry point into Fort Knox, namely your friends, your business associates and your clients, because all of these people do not necessarily share the same security concerns as you do. And that's how the hackers got Apple's data on the Macbook Pro, not directly through Apple, but through Quanta which is an Apple partner. And that's how hackers get to you indirectly from your clients who are small business owners that don't necessarily share the same concerns and aspirations in regards to computer security. In fact, most my clients who were journalists and activists got hacked through their colleagues. Even their ProtonMail account got hacked and TOR site connection got hacked, because they are started with just one or more journalists who did not aspire to implement good security measures and then through friendly communications through email, files etc allowed the hackers to plant malware on the target hosts. Hackers study the target host really well; their friends, their communication patterns and what not to find a way to plant that malware on you.

In fact, current hackers behave almost the same way as the Coronavirus, that slimy pathogen that is extremely stealthy but is very infectious. Most hackers today use sneaky and stealthy ways to penetrate your security defences, but again, what is it worth for the hackers time and effort. Today, hackers are very monetary based driven.

I myself am very careful and while I have some experience and knowledge in cyber security, I know that if someone wants to hit me badly, they will always find a way.
 
Last edited:

vandrei

macrumors newbie
Apr 27, 2021
1
0
Today, hackers are very monetary based driven.
Bingo.

Unless you are someone like the POTUS or Tim Cook . . . or you have copies of a soon-to-be-released Disney or Pixar blockbuster, those "hackers" are not particularly interested in you beyond encrypting your files and demanding a cash ransom for the encryption key and/or abusing your computing resources (CPU, GPU, RAM, disk, network, whatever) for their own purposes, financial or otherwise.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.