Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
March 6, 2014 - A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads...
February 26, 2014 - You’ve probably heard by now of Facebook purchasing the popular messaging application WhatsApp was recently purchased for the sum of $19 billion,...
February 20, 2014 - The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In...
February 19, 2014 - Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,...
February 13, 2014 - It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,...
February 12, 2014 - The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time...
February 6, 2014 - It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are...
January 29, 2014 - As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,...
January 23, 2014 - Facebook awarded its highest bug bounty to date to a Brazilian Security Engineer Reginaldo Silva, yesterday. The bounty, an estimated total of...
Contributors
Threat Center
Podcast
Glossary
Scams