Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Last week, we looked at a ransomware strain that appears to be a fake version of DMA Locker. We also focused on…
Welcome to our new series: interview with a malware hunter. In these Q&A sessions, we’ll take you behind the scenes to…
One of the most often pieces of advice I give when speaking to friends and relatives regarding online threats is to…
In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing…
Ransomware has become a popular criminal business with a relatively easy entrance. Even the people with little technical knowledge can build…
Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as…
Given the recent renewed attention about ‘RoughTed’ and Kafeine‘s tweet, we wanted to clarify that RoughTed and associated domains are in fact part…
Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter…
Security researcher Bosko Stankovic recently published an article explaining how an attacker could use Chrome, the SMB file sharing protocol, and…