Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Last week on Malwarebytes Labs, we looked at spyware going mainstream, how the popular game Fortnite sparks security concerns for Android users, and how…
There is a concerning trend lately in the Mac App Store. Several security researchers have independently found different apps that are…
There’s been no small outbreak of chaos in mobile land recently, all because of an astonishingly popular game called Fortnite. Here’s…
Stealware. Surveillanceware. Stalkerware. These are terms alternately used to effectively identify a file-based threat that has been around since 1996: spyware….
Last week, we looked at dubious antics in mobile land, a peculiar case of spam on the official Cardi B website,…
Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…
Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…
Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require…
We come bearing tidings of proper website maintenance and general housekeeping for singer Cardi B (or rather, for her web development…