Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Sometimes it is necessary to use random numbers in programs. Depending on the need, it can be important how random the...
After supplying you with examples on how to encrypt your mail and how to encrypt files and folders I would like...
Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options...
Given recent events and worries about data-leaks and other privacy issues, you might find it handy to have some tools to...
A Trojan (horse) in computer-terms is a type of malware that does not replicate itself.The name is based on the mythological...
The Malwarebytes Anti-Malware Pro version offers you a protection module that utilizes different methods to stop malware, before it can hurt...
Proxy (the authority to act for someone else) is a term that we use, when related to computers, to describe using...
A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we...
In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g....
Contributors
Threat Center
Podcast
Glossary
Scams