Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
After supplying you with examples on how to encrypt your mail and how to encrypt files and folders I would like...
Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options...
Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to...
A Trojan (horse) in computer-terms is a type of malware that does not replicate itself.The name is based on the mythological...
The Malwarebytes Anti-Malware Pro version offers you a protection module that utilizes different methods to stop malware, before it can hurt...
Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using...
A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we...
In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g....
What is a text popup?A text popup is a link that opens a popup box containing advertisements, usually prompted by a...
Contributors
Threat Center
Podcast
Glossary
Scams