Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
There are lots of ways you can have a bad hair day with a mobile device – a rogue app from…
A recently patched Internet Explorer vulnerability (CVE-2015-2419) has already made its way into the top exploit kit on the market, Angler…
Oftentimes when performing automated analysis of malware we seek to answer one basic question: what kind of malware is it?Automated analysis…
Last week, we saw a fake Android alert that blames Chinese hackers, a peculiar Facebook phishing campaign that is after your…
Desktops and laptops have long been major targets for viruses and other cyber attacks, but with the exponential growth and availability…
Update (08/11): Mac users are now being targeted by a newer version of this exploit.Original Post:Mozilla released a critical security advisory late…
This post describes the process of unpacking a malicious payload delivered in a new spam campaign.I often observe malicious samples, distributed in…
Update: We now have an in-depth analysis of this Malware on the blog.There’s a piece of email spam currently in circulation, offering…
The HackingTeam data leak was a treasure trove for threat actors. As we documented on this blog, it didn’t take long…