Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
The last couple of years saw a growth in diversity- and women-focused tech events and programs; suddenly, everyone seems to be...
Malwarebytes was proud to participate in America SCORES Bay Area’s Corporate Cup this winter. The local non-profit helps provide after school...
Malwarebytes released our annual list of predictions for the year 2017. We claimed that ransomware will remain king—and personal. We also...
From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya – you can read about it here. The second...
2016 was the year of ransomware, with hackers focusing their attention on exploiting Internet users and businesses around the world for...
Last week we launched Malwarebytes 3.0, our next-generation antivirus replacement. We also touched on domain generating algorithms (DGA), went up-close and...
Rootkits are tools and techniques used to hide (potentially malicious) modules from being noticed by system monitoring. Many people, hearing the...
Last week, we commented on Gooligan, homed in on a fake WhatsApp phishing email, and discussed about a rogue Chrome extension...
Last week, we took a look at a ransomware called PrincessLocker, of which researcher Hasherezade created its decryptor. At the same...
Contributors
Threat Center
Podcast
Glossary
Scams