To add to what Thomas has said.
You are conflating a user (human) interaction with all the interactions that are continuously happening all the time in a modern computer. And by modern I mean most anything made in the last 20 to 40 years.
If you bring up Activity Monitor from your Utilities folde you’ll see dozens or hundreds of applications running. Most setups easily have over 100 applications running. I just quit out of the more than a dozen applications with a user interface and still had over 400 tasks/applications running on my system. And each of these is “doing something”. Watching for a Wi-Fi or Bluetooth interaction or connection. Maybe a wired network interaction. A USB port being plugged into something. (Your keyboard and mouse are USB devices these days even if you don’t see the cables.) The battery reporting its charge state. The microphone detecting “Hey Siri”. (The last one is way over simplified but the mic is always on.) There is ALWAYS networking traffic flowing and tickling your ports. It’s just the way networks work these days.
Open up a browser window? Now you have all kinds of stuff going on. Gmail’s web site does live updates to your browser window as emails come into your inbox. Shutting down the JavaScript that allows this to work will break most web sites these days. Not to mention all those ads and similar things that can happen. The Ghostery plug in has over 5000 items in its inventory of things you can allow or not. (Trust your bank. Don’t trust “we give you free stuff all day long”.) (I’m a big fan of Ghostery.)
The problem is mostly software errors. With a few issues resulting from bad standards. When everyone plays by the rules things work almost all the time. But the common example is a buffer overflow.
If the rules say the sender can ship between 1 and 80 characters and it ships 81 well that’s too many. But if the receiving system doesn’t check suddenly there is 1 character where it should not be. And in the bad early days of malware, a bad actor would literally ship a very long string of data containing some code that would wind up where it would get exectuted and the malware then be in charge.
Most of this simplistic attack is now checked against. And standards tightened up to avoid such things. And modern operating system internally do things to make these attacks very much harder than before. No developer with any sanity writes code anymore that just assumes everything it is handed is perfect. But still you can get into problems when the receiving system checks but doesn’t address being told a billion or so characters are coming and barfs. And said barf is in a predictable way such that a system can be compromised.
And this is why every now and then you read about how an unread email or “text” message can compromise a system.
As a side note there are various TLA (Three Letter Agencies) and similar that work hard at finding software bugs that will let them break into a system. And they hold these close to their vest. Especially the really obscure ones. So they can target a small subset of high value targets. Presidents, generals, ambassadors, banking C-suite folks, etc… These tend to almost all be what are called 0 day exploits. But others are packaged up and sold as a “how to steal from others” kit. Which is what most of us have to deal with in terms of malware. (Ukraine was a center of such things prior to 2014. Long interesting history that ties to the current situation there but I digress.)
Anyway, all of the decent Malware fighting companies work continuously to look for and stop attacks that have been spotted. And the bad guys love systems that are no longer being patched.
Personally I like MalwareBytes. And I’m not a fan of Norton. I’ll leave it at that.
But how can they get into my system? Well, there are a lot of malware tool kits that are sold that spread by various means. Many of these run on Windows computers. So if you best friend or son’s girlfriend brings an infected computer to your house and you let it on your network it might try and infect your security camera, printer, TV (most TVs have terrible security), whatever is connected to your network and has an exploitable embedded OS. Even some routers. Or attached some bad bit to emails sent to you. Or ….
How do you deal without becoming an hermit? Well assume the really really really sophisticated attacks are not aimed at you. These can cost the attacker $100k or more per device attacked.
At a lower level, in your home, don’t allow unknown computers on your wired network. Use a Guest network that can’t see anything else in your house. Don’t plug in that odd USB drive unless you know where it came from and why and preferably have some malware detection software running.
Keep your systems up to date.
In your browsers, well what I do is
- Show full web site addresses in Safari or others
- Turn off the “Open Safe Files” in Safari or others
(This one suprises me that Apple has this option.)
- Install Ghostery on all my browsers (I have Safari, Chrome, and Firefox)
- Don’t give web sites accesss to your contacts or similar. Just say no.
- Set your browsers and email applications to have you pick where to save things.
- Periodically look in:
- ~/Library/LaunchAgents
- ~/Library/LaunchDaemons
- /Library/LaunchAgents
- /Library/LaunchDaemons
This last one is a bit of a geek things but this is where things are placed that auto run without you asking. There are a few more but if you’re geeking at this level you can find them. Please NOTE that these things must exist today. If you have some anti malware software it will have entries in one or more of these places so it can run all the time.
And a very very very big one. Think long and hard before installing any browser plug in. These things will get to see EVERYTHING you type and is displayed. EVERYTHING. Those coupon / shopping savings plugins cost real money to develop and maintain. This money comes from them selling your information to others. Nuff said.
Think about using your computer like visiting a hospital. If you see a $20 bill on the corridor floor would you just pick it up and shove it in your pocket? Or walk into a room not knowing what is in it and whay you are walking in? Not me.
Later