Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….
The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from…
From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya – you can read about it here. The second…
NOTE: thanks to the Wack0lian for research contributions It would seem that scams as a service are a growth business…
2016 was the year of ransomware, with hackers focusing their attention on exploiting Internet users and businesses around the world for…
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the…
Update (12/2): According to Forbes, this zero-day was sold by Exodus Intel earlier this year and somehow got leaked. Additional coverage…
A new ransomware, TeleCrypt appeared recently carrying some new ideas. While most ransomware communicates with their C&C over simple HTTP-based protocols,…