Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots…
A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…
It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,…
The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time…
Fake or rogue tech support companies are lurking everywhere. Whether they cold-call you or deceive you with ads and pop-ups, you…
Online ads can be very aggressive and disruptive, not to mention they often carry malicious payloads aka malvertising. You may have come…
It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are…
The Domain Name System (DNS) is the equivalent of the phone book for the Internet in that in translates host names…
As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,…