Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Malwarebytes

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why more than 50,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts

Headquarters: San Jose CA 95113
Phone: 8007781082
Our Website: http://www.malwarebytes.org


Latest Content From Malwarebytes

Infographic: It’s baaaaack: Emotet has returned

by MalwarebytesAug 12, 2020

After a five-month break from the world of cybercrime, Emotet is back and already causing trouble for organizations. Read the Emotet Emergency Kit to learn:

  • How Emotet evolved from a banking Trojan to a botnet
  • Which tactics it's using to infect organizations
  • Why it's dangerous—especially for businesses with remote workers
  • Which secondary payloads we've spotted in its latest campaign


Whitepaper: The Malware Threats Capitalizing on COVID-19

by MalwarebytesAug 12, 2020

The threat landscape evolved rapidly in the wake of the COVID-19 pandemic with never-before-seen methods confronting IT teams all over the globe. But Malwarebytes analysts were on the case. Read the special-edition Cybercrime tactics and techniques report to learn everything you need to know about:

  • The malware families using COVID-19 themed campaigns
  • Other criminal operations like card skimmers and state sponsored attacks
  • Valuable security knowledge to protect the remote workforce


Infographic: 2020 State of Malware Highlights (or Lowlights?)

by MalwarebytesJun 19, 2020

It depends if your worldview is "half-empty" or "half-full." In any case, analysis of the latest cybercrime data is in and it's clear that cybercriminals had a busy 2019. The volume of global threats against business endpoints has increased 13% year-over-year.

Get an illustrative view of the top cybersecurity threat takeaways--from Windows & Mac threats to industry threats and malware detections around the globe. And peek into cybersecurity predictions for 2020. Have they come true?


Research Report: 2020 State of Malware Report

by MalwarebytesJun 19, 2020

Stay informed, stay secure--2020 State of Malware

The 2020 State of Malware Report features data sets collected from product telemetry, honey pots, intelligence, and other research conducted by Malwarebytes threat analysts and reporters to investigate the top threats delivered by cybercriminals to businesses in 2019.

Read the report and discover:

  • Threats to Mac and Windows, Android and iOS
  • The volume of threats to specific regions and industries
  • Net new ransomware activity
  • 2020 cybersecurity predictions


E-Book: Threat Hunting Made Easy

by MalwarebytesJun 19, 2020

Hunting for Threats is No Longer a Luxury

Enjoy a cup of coffee for this 5-minute read and you'll be on your way to saving hours every month on threat investigation and response. Hunting for threats is no longer a luxury, it's a necessity.

Learn how response-driven investigations can deliver recovery in minutes with a solution that automates and guides you through these essential steps:

  • Isolate: contain the suspicious activity
  • Investigate: determine if the threat is malicious or benign
  • Respond: remediate in one click


Whitepaper: The Value of Multi-Vector Protection on the Endpoint

by MalwarebytesJun 19, 2020

Multi-vector endpoint protection to the rescue

Securing your endpoints with multi-layered techniques should not place undue efficiency or resource burdens on your operations or end users. For the strongest and most efficient endpoint security approach, pursue multi-vector protection from a single vector.

Read further to learn:

  • What is multi-vector endpoint protection
  • The differences between a multi-vector and single vendor solution
  • Malwarebytes' real-time protection layers--a competitive contender


Whitepaper: Commitment to Innovation Secures Longtime Customer

by MalwarebytesJun 19, 2020

Going beyond a modern endpoint security solution

Learn what happened when Langdale Industries confronted

  • Ineffective protection even with leading AV solutions
  • Long hours of remediation, impeding end-user's ability to work
  • A ransomware attack that shut down operations.

Now a longtime customer, they attribute their confidence to Malwarebytes' commitment to innovation and excellent service. And it doesn't hurt that Malwarebytes is easy and its multiple detection techniques ensure zero-hour malware protection.