Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware…
We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to…
If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has…
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….
Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies…
Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of…
Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone…
Comments on the Malwarebytes labs blog can be well written, valuable additions to our published work, and sometimes provide additional data…