Cybersecurity basics

New to cybersecurity?
You’ve come to the right place.

Everything you need to know about cybercrime

The world of cybercrime is always changing. When viruses first appeared, most of them were pranks. To stay safe online, one of the best things you can do is stay educated on the litany of threats that lurk on the web. Use this information hub to learn everything you need to know about cyberthreats, and how to stop them.

Antivirus and anti-malware. Both refer to cybersecurity software, but what do these terms mean, how do they differ, and how do they relate to today’s digital threats?

Read more

Malware, or malicious software, is a blanket term for any kind of computer software with malicious intent. Most online threats are some form of malware.

Read more

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Read more

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behavior online so it can target you with specific ads.

Read more

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

Read more

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just because they can.

Read more

Phishing is a method of tricking you into sharing passwords, credit card numbers, and other sensitive information by posing as a trusted institution in an email or phone call.

Read more

A data breach comes as a result of a cyberattack that allows cybercriminals to gain unauthorized access to a computer system or network and steal the private, sensitive, or confidential personal and financial data of the customers or users contained within.

Read more

Android is the biggest mobile OS on the planet, on over 2 billion devices. This also makes the Android platform the biggest target for cybercriminals attempting to spread viruses and other malware.

Read more

Trojans are programs that claim to perform one function but actually do another, typically malicious. Trojans can take the form of attachments, downloads, and fake videos/programs.

Read more

Despite their reputation, Macs are still vulnerable to cyberthreats. They’re also a growing target of hackers, who are eager to prey on users who assume they’re safe.

Read more

Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere.

Read more

Keyloggers secretly record what you see, say and do on your computer. Employers use keyloggers to watch employees, but cybercriminals use them too.

Read more

Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. And it's more than a nuisance. Spam today is a serious threat.

Read more

Cybercriminals use SQL injections to exploit software vulnerabilities in web applications and gain unauthorized access to your sensitive and valuable data.

Read more

DDoS is a malicious network attack in which hackers overwhelm a website or service with false web traffic or requests from numerous enslaved Internet-connected devices.

Read more

Spoofing is when someone or something pretends to be something else in an attempt to gain our confidence, get access to a system, steal data, or spread malware.

Read more

Cryptojacking is an emerging form of malware that hides on your device and steals its computing resources in order to mine for valuable online currencies like Bitcoin.

Read more

What spam is to email, robocalls are to your phone. They're annoying, automated, and often illegal pre-recorded messages. Cybercriminals use robocalls to steal information and money from victims.

Read more

Exploits take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.

Read more

Malvertising, or malicious advertising, is the use of online advertising to distribute malware with little to no user interaction required.

Read more

A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network or software application.

Read more

Identity theft occurs when a criminal obtains or uses the personal information; e.g. name, login, Social Security number, date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.

Read more

state of malware

Quarterly and annual reports

The world of cybercrime is much like the world of technology itself. Every year brings new trends, new innovations, and new tools. To get a sense of how cybercrime changes year to year, check out our cyberthreats reports, as well as our quarterly Cybercrime Tactics and Techniques reports.

Cybercrime Tactics and Techniques:

State of Malware:

Malwarebytes shield, video game controller, graduation cap

Tips for staying safe online

Don't let malware and other cyberthreats ruin your day. Stay one step ahead of the cybercriminals with our tips, tricks, and guides for staying safe, having fun, and getting things done online.

mobile security

Mobile security

Cyberattacks aren’t exclusive to your computer. Your smartphone and your tablet are vulnerable too. In fact, cybercriminals see them as the next frontier. Check out these articles to learn about the latest in mobile cybercrime.

Try Malwarebytes for free

FOR HOME FOR BUSINESS

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language

Cybersecurity basics

Your intro to everything relating to cyberthreats, and how to stop them.