Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
When looking at malicious traffic, one of the things we are interested in are the hosts involved in a particular attack. For…
Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of…
Last week, we investigated Twitter app scammers using stolen celebrity nudes as bait, explored the world of Chinese PUPs and backdoors, took…
A phishing campaign currently in circulation is attempting to bait World of Warcraft with the promise of free in-game pets. We’ve…
In this article, we will try to explain the terms packer, crypter, and protector in the context of how they are…
BLU manufactured mobile devices have been discovered with preinstalled adware known as Android/Adware.YeMobi. Behavior of YeMobi The incriminating behavior of adware YeMobi…
Recently we noticed a change on one of the domains that we monitor because they are known to host files related to…
Update: Apple has confirmed that there has been no breach of any Apple systems, and that any accounts the hackers have…
A new spear phishing campaign is targeting Saudi Arabia governmental organizations. The attack originates from a phishing email containing a Word document…