Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
You may well be seeing an email appearing in your inbox from Viator.com, a website designed to help you find tours and…
It seems there’s an issue for Amazon Kindles owners should be aware of and take appropriate steps to avoid. A security researcher discovered malicious…
Another day, another large haul of logins posted to the web. While the linked article sounds a bit scary with mentions…
Do you want a phone that is privacy centric? Would you like a handset that genuinely tries to transmit and receive your…
In a previous post, I showcased the PirateBox, an anonymous offline mobile file sharing and communication system. While it was a fascinating…
If you want to anonymize your Internet traffic, one of the most common solutions available is to use a commercial VPN…
In this blog post, I will talk about a Live CD Linux distribution geared towards preserving privacy, anonymity and circumventing censorship. Who…
“Cyberattackers compromised a small number of employee log-in credentials” are never words you want to see, but unfortunately that’s the situation…
In this post I will explain UEFI (Unified Extensible Firmware Interface) and its predecessor, the BIOS/MBR, as well as the challenges…