Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
January 20, 2017 - Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of...
January 10, 2017 - Sometimes when you are looking for instructions to troubleshoot software issues or adapt software to your liking and you are looking...
December 14, 2016 - In this blog post, we are going to take a closer look at some of the code that the most predominant...
December 6, 2016 - A Domain Generating Algorithm (DGA) is a program or subroutine that provides malware with new domains on demand or on the...
November 29, 2016 - We have found a number of websites whose sole purpose is to try and force an extension on anyone visiting that...
November 8, 2016 - Recently, we have noticed that fake pharma sites seem to have discovered the use of JavaScript to change the “Stay or...
October 28, 2016 - While it is not uncommon to find malware or code on Pastebin, it is a surprise to find a dropper that...
October 21, 2016 - Content Protector or Content Defender as it was called before, is an adware not to be confused with the legitimate WordPress...
October 11, 2016 - We have found members of the Elex family to create an extra Firefox profile and wrote about it on our blog...
Contributors
Threat Center
Podcast
Glossary
Scams