Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,…
The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time…
Fake or rogue tech support companies are lurking everywhere. Whether they cold-call you or deceive you with ads and pop-ups, you…
Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising. You may have come…
It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are…
The Domain Name System (DNS) is the equivalent of the phone book for the Internet in that in translates host names…
As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,…
What is it? A website telling the end-user that they need to update their Java install. Why is it risky? When…
The tech support scam (AKA the Microsoft/Windows support technician call), which is essentially about social engineering a mark over the phone…