Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
A recently patched Internet Explorer vulnerability (CVE-2015-2419) has already made its way into the top exploit kit on the market, Angler…
There are lots of ways you can have a bad hair day with a mobile device – a rogue app from…
Desktops and laptops have long been major targets for viruses and other cyber attacks, but with the exponential growth and availability…
Update (08/11): Mac users are now being targeted by a newer version of this exploit.Original Post:Mozilla released a critical security advisory late…
This post describes the process of unpacking a malicious payload delivered in a new spam campaign.I often observe malicious samples, distributed in…
The HackingTeam data leak was a treasure trove for threat actors. As we documented on this blog, it didn’t take long…
Update: We now have an in-depth analysis of this Malware on the blog.There’s a piece of email spam currently in circulation, offering…
We sometimes see Facebook Apps pages being used for phishing scams, and here’s one that’s been doing the rounds recently: apps(dot)facebook(dot)com/783348471781894 This apps…
DisclaimerThe following research is the result of a collaboration with ad-fraud fighting firm Sentrant. Analysts from both the Sentrant and Malwarebytes teams have been…