Since June 27th we have been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since day one,…

A lot of companies don’t make clear who their tech support is, what their relationship to that group is, and what…

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy…

Malwarebytes is proud to support Cybersecurity Factory, a 10-week summer program for early-stage cybersecurity companies. This program runs in collaboration with…

At Malwarebytes, we take great pride in the fact that we’re protecting customers – not just from malware – but from…

I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection…

Several years ago, I blogged that we would be increasing how aggressive we would be in detecting Potentially Unwanted Programs (PUPs) and…

My attention was drawn a few weeks ago to a group of 6 apps in the Mac App Store, all made…

In an earlier blog post about DNS hijacks, we briefly touched on the hosts file. The hosts file is like your…

Scammers will always try and imitate legitimate tools and services in an effort to trick people into harming their accounts and…