McAfee VirusScan for Mac (formerly known as Virex) is an anti-virus software developed by the Network Associates. The current release has been found to have a notable bug that slows performance such that we do not recommend installing it at the moment. As we test new releases, we will update this page accordingly.
McAfee VirusScan for Mac is installed in all of the campus Macs.
See the note at the beginning of the page for information on why there is no download available for Macs at this time.
Questions and Answers
Are Macintosh computers more secure than PC computers?
Yes, *but that does not mean that they don't need virus protection. Macs can act as carriers and pass on infected files. This is especially true of macro viruses communicated via Microsoft Office documents.
- The best protection against viruses on a Macintosh is to not run any program on it that you are not sure of its origin and purpose. Macintosh computers are generally not affected by the plethora of viruses and other malicious threatens that Windows based computers are vulnerable to. PC trojans and other malware, however, often spread themselves around as e-mail attachments. When an unsuspecting Windows user receives and then opens such an attachment, one of the first thing the trojan will do is scan that user's e-mail address book and start sending itself out to those no it. If you use a Mac and receive a strange attachment or start getting strange emails, even if it is addressed from a friend or colleague, do not download it. Luckily, opening those attachments on a Mac will have little or no effect on your system, but now you will get several such emails daily and propagate the malicious program to other, vulnerable, Windows users. If you find that you are getting dozens of these messages a day you may want to look to see if the e-mails or attachments have hte same anme and set up a rule in your e-mail client program to flag or delete them as they arrive.
- Turning on any of the sharing services (in System Preferences: Sharing) should not be done unless you know what you are doing and have a specific use in mind. This is especially rue with Remote Login and Remote Apple events, both of which could allow an unauthorized user to log into and execute files and services without your knowledge.
Skip to end of metadata Go to start of metadata