The lazy person’s guide to cybersecurity: minimum effort for maximum protection

How can we help our less tech-savvy friends stay more secure online? By giving them a lazy person’s guide to cybersecurity, we can offer maximum protection for minimal effort.

Read more

A user’s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)

By identifying and detecting Potentially Unwanted Programs (PUPs), Malwarebytes protects its users while giving them the right to choose whether they continue using their services. Learn why we do this, and how software programs can be reconsidered as legitimate under our PUP criteria.

Read more

CyberByte steals Malwarebytes’ intellectual property

CyberByte has stolen Malwarebytes’ intellectual property, and has been using our data without permission in their CyberByte Antivirus software.

Read more

Winning the battle against PUPs on your computer and in court

This week, a United States District Court judge ruled in Malwarebytes’ favor, dismissing a lawsuit brought against us by Enigma Software Group USA LLC (“Enigma”). Essentially, they sued us because we classified two of their software programs as Potentially Unwanted Programs (PUPs).

Read more

Yet more mobile adware found in Google Play

Two new mobile adware variants were found in the Google Play store—all in one week.

Read more

Mobile Menace Monday: despicable adware

Are you wondering how that mysterious icon ended up on your Android phone’s start screen? Annoyed at the ads clogging your notification bar? It’s adware, and you aren’t alone.

Read more

System optimizers turning to tech support scams

PUPs and more specifically system optimizers have been found turning to tech support scams to increase the amount of money they can take from their unsuspecting customers.

Read more

Adware the series, part 1

In this series, we will be using the below flowchart to follow the process of determining which adware we are dealing with. The idea is to give you an idea of how many different types of adware are around for Windows systems.

Read more

Report: Cybercrime climate shifts dramatically in first quarter

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts.

Read more

Spigot browser hijackers

Spigot browser hijackers of this family are easy to recognize and in our opinion hardly worth installing because they add no more functionality then a few bookmarks. We hope this post helps you to avoid them in the future.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language