“Any malware powerful enough to overcome the defenses that Apple built to resist incursions may also be powerful enough to hide its traces,” Glenn Fleishman writes for Macworld. “That’s not quite an axiom of security, but it’s generally true. If an attacker of any sort creates software designed to attack your system quietly, it typically tries to prevent security software and any other kind of inspection from noticing.”

“That’s very, very hard, and any exploit that’s sufficiently good at being entirely invisible is likely also good enough for a hacker to sell for a million dollars,” Fleishman writes. “Such exploits, once discovered, are fixed at high priority by operating system makers, giving them sometimes short windows of utility. The more widely used the exploit is, the less likely it will remain available to use.”

Fleishman writes, “If you want to monitor and block potential adverse actions, I recommend these four areas, some of which have a single product offering, often cheap.”

Read more in the full article – recommendedhere.

MacDailyNews Take: Good advice and info in the full article for security-conscious Mac users.