< Personal
Find the right product
Infected already?
< Business
Our sales team is ready to help. Call us now. 800-520-2796
< Pricing
Protect your personal devices and data
Protect your team’s devices and data
Explore our award-winning endpoint security products, from EP to EDR to MDR
< Partners
< Resources
The State of Malware 2023 Report
< Support
July 23, 2013 - Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to...
June 4, 2013 - A Trojan (horse) in computer-terms is a type of malware that does not replicate itself. The name is based on the...
May 24, 2013 - The Malwarebytes Anti-Malware Pro version offers you a protection module that utilizes different methods to stop malware, before it can hurt...
May 11, 2013 - Malware today is so numerous and diverse that security professionals have known for some time that signature based solutions would no...
April 10, 2013 - Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using...
March 25, 2013 - A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we...
February 20, 2013 - In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g....
February 13, 2013 - What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by...
February 5, 2013 - This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid...
Contributors
Threat Center
Podcast
Glossary
Scams
Select your language