It saddens me to report that at around 3 PM PST yesterday, Malwarebytes released a definitions update that disabled thousands of…

It’s a beautiful day in our new neighborhood! Moving from a tiny, overly-crowded office to the shiny new Malwarebytes headquarters overlooking…

[ Need assistance? Please consult our Help & Resource Page ] Have you ever received a call from someone with a heavy…

Proxy (the authority to act for someone else)  is a term that we use, when related to computers, to describe using…

Exploit Kit authors must really love Java . Not only is it ripe with vulnerabilities but its own language provides a…

As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery.  This…

Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type…

On March 20th, reports were circulating that a cyberattack had been conducted against broadcast networks and banks in South Korea.  In…

A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we…

We often hear about botnets (networks of infected computers) being used to send out spam, perform Distributed Denial of Service attacks…