Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads...
You’ve probably heard by now of Facebook purchasing the popular messaging application WhatsApp was recently purchased for the sum of $19 billion,...
The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In...
Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,...
It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,...
The Citadel Trojan is nothing new, but I found one recently obtained from our collection systems and had a fun time...
It’s not uncommon for the malware of today to include some type of built-in virtual machine detection. Virtual Machines (VMs) are...
As cloud computing becomes more popular, malware authors are also taking interest in using this technology to store their own files—except,...
Facebook awarded its highest bug bounty to date to a Brazilian Security Engineer Reginaldo Silva, yesterday. The bounty, an estimated total of...
Contributors
Threat Center
Podcast
Glossary
Scams