Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options...
Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to...
A Trojan (horse) in computer-terms is a type of malware that does not replicate itself. The name is based on the...
The Malwarebytes Anti-Malware Pro version offers you a protection module that utilizes different methods to stop malware, before it can hurt...
Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using...
A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we...
In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g....
What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by...
This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid...
Contributors
Threat Center
Podcast
Glossary
Scams