Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Stealware. Surveillanceware. Stalkerware. These are terms alternately used to effectively identify a file-based threat that has been around since 1996: spyware....
They can go undetected for years. They do their questionable deeds in the background. And, at times, one wonders if they’re...
We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t...
Bank card—check! Shopping list—check! Lumbar back support pillow—check! Noise canceling headphones—check! And, of course, coffee—check! If you’re an Amazon shopper, then...
Gone are the days when eavesdropping is just the stuff of spies and the town gossip. In fact, it has evolved...
When you hear the term “reputation risk management,” you might think of a buzzword used in the business sector. Reputation risk...
June marks the beginning of summer. It is also National Internet Safety Month. This is the perfect time to remind vacationers...
Virtual personal assistants (VPA), also known as smart assistants like Amazon’s Alexa and Google’s Assistant, are in the spotlight for vulnerabilities to...
Developers are usually the focus of blame when software vulnerabilities cause organizational breaches. (Sometimes, quality assurance engineers are included in the...
Contributors
Threat Center
Podcast
Glossary
Scams