Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Here’s a scam mail which claims your iCloud has been accessed without permission, and will be locked within 2 hours if you…
Many of us are all too aware of the uptick in news stories about phishes, online scams, and customer data breaches. Social…
Valentine’s Day is upon us once more, and so are lots of dating-friendly security tips. Read on and secure your profile,…
Macro malware – commonly known as a “Word macro virus” – involves maliciously-crafted Microsoft Office documents containing Visual Basic macros. These…
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies…
Comments on the Malwarebytes labs blog can be well written, valuable additions to our published work, and sometimes provide additional data…
Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone…
This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR…