Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
There are several different types of malware that look for interesting information on an infected computer and transmit that information to...
UPDATE (as of 5/18/17): UPDATE (as of 5/17/17): Reports of two massive, global ransomware attacks are dominating the news. As workers...
In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing...
In this post, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our...
A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support...
In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing...
In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are...
Recently we noticed a change on one of the domains that we monitor because they are known to host files related to...
Adware and ad fraud are in the same business and both don’t care very much how they make money, as long...
Contributors
Threat Center
Podcast
Glossary
Scams