CINXE.COM

Exploit Definition | What is exploit?

<!doctype html> <html lang="en"> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <link rel="preconnect" href="https://fonts.googleapis.com"> <link rel="preconnect" href="https://fonts.gstatic.com" crossorigin> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/RobotoSerif-Medium.00ec4109.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/RobotoSerif-Medium.a8a104b1.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.b009a76a.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Regular.f1e2a767.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.227c9319.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Bold.77ecb942.woff" as="font" type="font/woff" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.2e8becfc.woff2" as="font" type="font/woff2" crossorigin="anonymous"> <link rel="preload" href="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/fonts/Roboto-Black.f5677eb2.woff" as="font" type="font/woff" crossorigin="anonymous"> <!-- This site is optimized with the Yoast SEO Premium plugin v23.8 (Yoast SEO v23.8) - https://yoast.com/wordpress/plugins/seo/ --> <title>Exploit Definition | What is exploit?</title> <meta name="description" content="What are computer exploits? What kinds of exploit protection and anti-exploit software is available? Read on to learn about this dangerous brand of malicious code designed to take advantage of vulnerabilities in your computer software and applications." /> <link rel="canonical" href="https://www.malwarebytes.com/exploits" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Exploit Definition | What is exploit?" /> <meta property="og:description" content="What are computer exploits? What kinds of exploit protection and anti-exploit software is available? Read on to learn about this dangerous brand of malicious code designed to take advantage of vulnerabilities in your computer software and applications." /> <meta property="og:url" content="https://www.malwarebytes.com/exploits" /> <meta property="og:site_name" content="Malwarebytes" /> <meta property="article:publisher" content="https://www.facebook.com/Malwarebytes" /> <meta property="article:modified_time" content="2024-04-15T18:46:55+00:00" /> <meta property="og:image" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/10/malwarebytes-exploits-share.jpg?w=1024" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="640" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="Exploit Definition | What is exploit?" /> <meta name="twitter:description" content="What are computer exploits? What kinds of exploit protection and anti-exploit software is available? Read on to learn about this dangerous brand of malicious code designed to take advantage of vulnerabilities in your computer software and applications." /> <meta name="twitter:image" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/10/malwarebytes-exploits-share.jpg?w=1024" /> <meta name="twitter:site" content="@malwarebytes" /> <meta name="twitter:label1" content="Est. reading time" /> <meta name="twitter:data1" content="15 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.malwarebytes.com/exploits","url":"https://www.malwarebytes.com/exploits","name":"Exploit Definition | What is exploit?","isPartOf":{"@id":"https://www.malwarebytes.com/#website"},"datePublished":"2023-08-16T05:35:37+00:00","dateModified":"2024-04-15T18:46:55+00:00","description":"What are computer exploits? What kinds of exploit protection and anti-exploit software is available? Read on to learn about this dangerous brand of malicious code designed to take advantage of vulnerabilities in your computer software and applications.","breadcrumb":{"@id":"https://www.malwarebytes.com/exploits#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https://www.malwarebytes.com/exploits"]}]},{"@type":"BreadcrumbList","@id":"https://www.malwarebytes.com/exploits#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.malwarebytes.com/"},{"@type":"ListItem","position":2,"name":"Exploits"}]},{"@type":"WebSite","@id":"https://www.malwarebytes.com/#website","url":"https://www.malwarebytes.com/","name":"Malwarebytes","description":"Cyber Security Software &amp; Anti-Malware","publisher":{"@id":"https://www.malwarebytes.com/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.malwarebytes.com/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https://www.malwarebytes.com/#organization","name":"Malwarebytes","url":"https://www.malwarebytes.com/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https://www.malwarebytes.com/#/schema/logo/image/","url":"https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/Malwarebytes-logo.png","contentUrl":"https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/Malwarebytes-logo.png","width":1200,"height":675,"caption":"Malwarebytes"},"image":{"@id":"https://www.malwarebytes.com/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/Malwarebytes","https://x.com/malwarebytes","https://www.linkedin.com/company/malwarebytes","https://www.youtube.com/user/Malwarebytes","https://www.instagram.com/malwarebytesofficial"]}]}</script> <meta name="googlebot" content="index, follow" /> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//stats.wp.com' /> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/shape-challenger-2.307bef30.png' as='image'> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/ajax-loader.6f9ac78c.gif' as='image'> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/app-play.5ed26b30.png' as='image'> <link rel='preload' href='/wp-content/themes/malwarebytes/assets/build/images/app-store.0d6e625d.png' as='image'> <style id='wp-block-library-inline-css'> :root{--wp-admin-theme-color:#007cba;--wp-admin-theme-color--rgb:0,124,186;--wp-admin-theme-color-darker-10:#006ba1;--wp-admin-theme-color-darker-10--rgb:0,107,161;--wp-admin-theme-color-darker-20:#005a87;--wp-admin-theme-color-darker-20--rgb:0,90,135;--wp-admin-border-width-focus:2px;--wp-block-synced-color:#7a00df;--wp-block-synced-color--rgb:122,0,223;--wp-bound-block-color:#9747ff}@media (min-resolution:192dpi){:root{--wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root{--wp--preset--font-size--normal:16px;--wp--preset--font-size--huge:42px}:root .has-very-light-gray-background-color{background-color:#eee}:root .has-very-dark-gray-background-color{background-color:#313131}:root .has-very-light-gray-color{color:#eee}:root .has-very-dark-gray-color{color:#313131}:root .has-vivid-green-cyan-to-vivid-cyan-blue-gradient-background{background:linear-gradient(135deg,#00d084,#0693e3)}:root .has-purple-crush-gradient-background{background:linear-gradient(135deg,#34e2e4,#4721fb 50%,#ab1dfe)}:root .has-hazy-dawn-gradient-background{background:linear-gradient(135deg,#faaca8,#dad0ec)}:root .has-subdued-olive-gradient-background{background:linear-gradient(135deg,#fafae1,#67a671)}:root .has-atomic-cream-gradient-background{background:linear-gradient(135deg,#fdd79a,#004a59)}:root .has-nightshade-gradient-background{background:linear-gradient(135deg,#330968,#31cdcf)}:root .has-midnight-gradient-background{background:linear-gradient(135deg,#020381,#2874fc)}.has-regular-font-size{font-size:1em}.has-larger-font-size{font-size:2.625em}.has-normal-font-size{font-size:var(--wp--preset--font-size--normal)}.has-huge-font-size{font-size:var(--wp--preset--font-size--huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-content:flex-start}.items-justified-center{justify-content:center}.items-justified-right{justify-content:flex-end}.items-justified-space-between{justify-content:space-between}.screen-reader-text{border:0;clip:rect(1px,1px,1px,1px);-webkit-clip-path:inset(50%);clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal!important}.screen-reader-text:focus{background-color:#ddd;clip:auto!important;-webkit-clip-path:none;clip-path:none;color:#444;display:block;font-size:1em;height:auto;left:5px;line-height:normal;padding:15px 23px 14px;text-decoration:none;top:5px;width:auto;z-index:100000}html :where(.has-border-color){border-style:solid}html :where([style*=border-top-color]){border-top-style:solid}html :where([style*=border-right-color]){border-right-style:solid}html :where([style*=border-bottom-color]){border-bottom-style:solid}html :where([style*=border-left-color]){border-left-style:solid}html :where([style*=border-width]){border-style:solid}html :where([style*=border-top-width]){border-top-style:solid}html :where([style*=border-right-width]){border-right-style:solid}html :where([style*=border-bottom-width]){border-bottom-style:solid}html :where([style*=border-left-width]){border-left-style:solid}html :where(img[class*=wp-image-]){height:auto;max-width:100%}:where(figure){margin:0 0 1em}html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:var(--wp-admin--admin-bar--height,0px)}@media screen and (max-width:600px){html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:0px}} </style> <style id='wp-block-heading-inline-css'> h1.has-background,h2.has-background,h3.has-background,h4.has-background,h5.has-background,h6.has-background{padding:1.25em 2.375em}h1.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h1.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h2.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h2.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h3.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h3.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h4.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h4.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h5.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h5.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h6.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h6.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]){rotate:180deg} </style> <style id='wp-block-list-inline-css'> ol,ul{box-sizing:border-box}ol.has-background,ul.has-background{padding:1.25em 2.375em} </style> <style id='wp-block-paragraph-inline-css'> .is-small-text{font-size:.875em}.is-regular-text{font-size:1em}.is-large-text{font-size:2.25em}.is-larger-text{font-size:3em}.has-drop-cap:not(:focus):first-letter{float:left;font-size:8.4em;font-style:normal;font-weight:100;line-height:.68;margin:.05em .1em 0 0;text-transform:uppercase}body.rtl .has-drop-cap:not(:focus):first-letter{float:none;margin-left:.1em}p.has-drop-cap.has-background{overflow:hidden}p.has-background{padding:1.25em 2.375em}:where(p.has-text-color:not(.has-link-color)) a{color:inherit}p.has-text-align-left[style*="writing-mode:vertical-lr"],p.has-text-align-right[style*="writing-mode:vertical-rl"]{rotate:180deg} </style> <style id='wp-block-pullquote-inline-css'> .wp-block-pullquote{box-sizing:border-box;overflow-wrap:break-word;padding:4em 0;text-align:center}.wp-block-pullquote blockquote,.wp-block-pullquote cite,.wp-block-pullquote p{color:inherit}.wp-block-pullquote blockquote{margin:0}.wp-block-pullquote p{margin-top:0}.wp-block-pullquote p:last-child{margin-bottom:0}.wp-block-pullquote.alignleft,.wp-block-pullquote.alignright{max-width:420px}.wp-block-pullquote cite,.wp-block-pullquote footer{position:relative}.wp-block-pullquote .has-text-color a{color:inherit}:where(.wp-block-pullquote){margin:0 0 1em}.wp-block-pullquote.has-text-align-left blockquote{text-align:left}.wp-block-pullquote.has-text-align-right blockquote{text-align:right}.wp-block-pullquote.is-style-solid-color{border:none}.wp-block-pullquote.is-style-solid-color blockquote{margin-left:auto;margin-right:auto;max-width:60%}.wp-block-pullquote.is-style-solid-color blockquote p{font-size:2em;margin-bottom:0;margin-top:0}.wp-block-pullquote.is-style-solid-color blockquote cite{font-style:normal;text-transform:none}.wp-block-pullquote cite{color:inherit} </style> <style id='wp-block-pullquote-theme-inline-css'> .wp-block-pullquote{border-bottom:4px solid;border-top:4px solid;color:currentColor;margin-bottom:1.75em}.wp-block-pullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase} </style> <style id='malware-bytes-hero-banner-v2-style-inline-css'> .hero-banner-v2{background-color:#0d3ecc;padding:15px 0 24px 0;min-height:300px;height:auto}.hero-banner-v2 .heading-text{color:#fff;font-size:28px;margin-bottom:10px}.hero-banner-v2 .desc-text{color:#fff;max-width:830px}.hero-banner-v2 .download-btn-one{display:inline-block;transition:all 150ms ease-out}.hero-banner-v2 .download-btn-one a{background-color:#fff;padding:10px 20px;border-radius:24px;display:inline-flex;align-items:center;font-weight:600;margin-right:2em;text-decoration:none}.hero-banner-v2 .download-btn-one a:hover{text-decoration:none}.hero-banner-v2 .download-btn-two{display:inline-block}.hero-banner-v2 .download-btn-two a{background-color:rgba(0,0,0,0);padding:10px 20px;border-radius:24px;display:inline-flex;align-items:center;font-weight:600;margin-right:2em;border:2px solid #fff;color:#fff;transition:all 150ms ease-out;text-decoration:none}.hero-banner-v2 .download-btn-two a:hover{text-decoration:none}.hero-banner-v2 .sub-description-text{color:#fff}.hero-banner-v2.layout-1{text-align:center;background-image:URL(/wp-content/themes/malwarebytes/assets/build/images/pillar-content-hero.438b4391.jpeg);background-repeat:no-repeat;background-size:cover}.hero-banner-v2.layout-1 .hero-banner-v2__content{background-size:cover}.hero-banner-v2.layout-1 .desc-text{display:inline-block}.hero-banner-v2.layout-1 .cta-button{text-align:center;width:100%}.hero-banner-v2.layout-1 .cta-button a{background-color:#fff;padding:10px 20px;border-radius:4px;display:inline-flex;align-items:center;font-weight:600;margin-right:0;transition:all 150ms ease-out}.hero-banner-v2.layout-1 .cta-button a .dynamic-svg{margin-right:10px;line-height:0}.hero-banner-v2.layout-1 .cta-button a .dynamic-svg svg{fill:#0d3ecc}.hero-banner-v2.layout-1 .cta-button a .visible-xs-only{display:none}.hero-banner-v2.layout-1 .cta-button a:hover{text-decoration:none}.hero-banner-v2.layout-1 .sub-heading-text{text-align:center;color:#fff}.hero-banner-v2.layout-1 .sub-heading-text a{color:#7094ff}.hero-banner-v2.layout-4 .sub-heading-text{color:#fff;max-width:830px}@media (min-width: 768px){.hero-banner-v2 .heading-text{font-size:40px}}@media (min-width: 992px){.hero-banner-v2 .heading-text{font-size:60px}}@media (max-width: 767px){.hero-banner-v2.layout-1 .cta-button a .visible-sm-lg{display:none}.hero-banner-v2.layout-1 .cta-button a .visible-xs-only{display:inline-block}} </style> <link rel="preload" as="style" onload="this.onload=null;this.rel='stylesheet'" href='https://www.malwarebytes.com/_static/??-eJyFjEEKwzAMBD9URw1taC6lb3FdRRgUWUQKJr+vSS85BHpbdnYWqoZUxFEclFfKYkBYPC6EnoWqgq5vzgmSHUj4ld2cpWvgAic3FYmLwyeb7/K0tEFo6Z8RVcF8YzQQrGHiSLvzmp/9o7+N12G8D1/NVETq' type='text/css' media='all' /> <noscript><link rel='stylesheet' href='https://www.malwarebytes.com/_static/??-eJyFjEEKwzAMBD9URw1taC6lb3FdRRgUWUQKJr+vSS85BHpbdnYWqoZUxFEclFfKYkBYPC6EnoWqgq5vzgmSHUj4ld2cpWvgAic3FYmLwyeb7/K0tEFo6Z8RVcF8YzQQrGHiSLvzmp/9o7+N12G8D1/NVETq'> </noscript><style id='weglot-css-inline-css'> html:not([lang="en"]) .site-header-searchbox { display: none!important; } </style> <style id='custom-flag-handle-inline-css'> .weglot-flags.flag-0.en>a:before,.weglot-flags.flag-0.en>span:before {background-image: url(https://cdn.weglot.com/flags/rectangle_mat/us.svg); }.weglot-flags.flag-1.en>a:before,.weglot-flags.flag-1.en>span:before {background-image: url(https://cdn.weglot.com/flags/shiny/us.svg); }.weglot-flags.flag-2.en>a:before,.weglot-flags.flag-2.en>span:before {background-image: url(https://cdn.weglot.com/flags/square/us.svg); }.weglot-flags.flag-3.en>a:before,.weglot-flags.flag-3.en>span:before {background-image: url(https://cdn.weglot.com/flags/circle/us.svg); } </style> <link rel="preload" as="style" onload="this.onload=null;this.rel='stylesheet'" href='https://www.malwarebytes.com/_static/??-eJydzlEOwjAMA9AL0YVuSHwhzpKMAJWaFtVB1W5Pd4TxacnPMvVPWGtxLU7+VlOQce7cVDYfgQF1kHxTfpAwNDxHG9MKnOiwlVxf/9EjKidp3DYahPa3gbuimk6Wyr5zt1u8LvMS43m+/ACMZGBn' type='text/css' media='all' /> <noscript><link rel='stylesheet' href='https://www.malwarebytes.com/_static/??-eJydzlEOwjAMA9AL0YVuSHwhzpKMAJWaFtVB1W5Pd4TxacnPMvVPWGtxLU7+VlOQce7cVDYfgQF1kHxTfpAwNDxHG9MKnOiwlVxf/9EjKidp3DYahPa3gbuimk6Wyr5zt1u8LvMS43m+/ACMZGBn'> </noscript><style id='kadence-blocks-global-variables-inline-css'> :root {--global-kb-font-size-sm:clamp(0.8rem, 0.73rem + 0.217vw, 0.9rem);--global-kb-font-size-md:clamp(1.1rem, 0.995rem + 0.326vw, 1.25rem);--global-kb-font-size-lg:clamp(1.75rem, 1.576rem + 0.543vw, 2rem);--global-kb-font-size-xl:clamp(2.25rem, 1.728rem + 1.63vw, 3rem);--global-kb-font-size-xxl:clamp(2.5rem, 1.456rem + 3.26vw, 4rem);--global-kb-font-size-xxxl:clamp(2.75rem, 0.489rem + 7.065vw, 6rem);}:root {--global-palette1: #3182CE;--global-palette2: #2B6CB0;--global-palette3: #1A202C;--global-palette4: #2D3748;--global-palette5: #4A5568;--global-palette6: #718096;--global-palette7: #EDF2F7;--global-palette8: #F7FAFC;--global-palette9: #ffffff;} </style> <script type="text/javascript" src="https://www.malwarebytes.com/wp-content/plugins/weglot/dist/front-js.js?m=1731435598g" ></script><link rel="https://api.w.org/" href="https://www.malwarebytes.com/wp-json/" /><link rel="alternate" type="application/json" href="https://www.malwarebytes.com/wp-json/wp/v2/pages/86834" /><link rel='shortlink' href='https://www.malwarebytes.com/?p=86834' /> <link rel="alternate" type="application/json+oembed" href="https://www.malwarebytes.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.malwarebytes.com%2Fexploits" /> <link rel="alternate" type="text/xml+oembed" href="https://www.malwarebytes.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.malwarebytes.com%2Fexploits&#038;format=xml" /> <style>img#wpstats{display:none}</style> <link rel="alternate" href="https://www.malwarebytes.com/exploits" hreflang="x-default"/> <link rel="alternate" href="https://www.malwarebytes.com/exploits" hreflang="en"/> <link rel="alternate" href="https://www.malwarebytes.com/de/exploits" hreflang="de"/> <link rel="alternate" href="https://www.malwarebytes.com/es/exploits" hreflang="es"/> <link rel="alternate" href="https://www.malwarebytes.com/fr/exploits" hreflang="fr"/> <link rel="alternate" href="https://www.malwarebytes.com/it/exploits" hreflang="it"/> <link rel="alternate" href="https://www.malwarebytes.com/nl/exploits" hreflang="nl"/> <link rel="alternate" href="https://www.malwarebytes.com/pl/exploits" hreflang="pl"/> <link rel="alternate" href="https://www.malwarebytes.com/pt-br/exploits" hreflang="pt-br"/> <link rel="alternate" href="https://www.malwarebytes.com/ru/exploits" hreflang="ru"/> <link rel="icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=32" sizes="32x32" /> <link rel="icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=192" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=180" /> <meta name="msapplication-TileImage" content="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/cropped-favicon-512x512-1-1.png?w=270" /> <style id="wp-custom-css"> @media (min-width: 1150px) { .site-header.mb-header-pricing .site-header__nav ul.primary-menu > li:not(:nth-child(3)) .megamenu-wrap { transform: translate(-42%, -200%); } .site-header.mb-header-pricing .site-header__nav ul.primary-menu > li:not(:nth-child(3)).active .megamenu-wrap { transform: translate(-42%, 0); } } </style> <meta name="apple-itunes-app" content="app-id=1327105431, affiliate-data=, app-argument="> <meta name="facebook-domain-verification" content="cmdpjevu8l4zya3vzr1p6f00v21uty" /> <!-- GTM --> <script type="text/javascript">(function (w, d, s, l, i) { w[l] = w[l] || []; w[l].push({ 'gtm.start': new Date().getTime(), event: 'gtm.js' }); var f = d.getElementsByTagName(s)[0], j = d.createElement(s), dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = '//www.googletagmanager.com/gtm.js?id=' + i + dl; f.parentNode.insertBefore(j, f); })(window, document, 'script', 'dataLayer', 'GTM-MKSKW3'); </script> <!-- End GTM --> <script> (function () { let plausibleDataDomain = 'dev-www.malwarebytes.com'; if (location.href.indexOf('https://www.malwarebytes.com') === 0 || location.href.indexOf('https://malwarebytes.go-vip.net') === 0) { plausibleDataDomain = 'w.malwarebytes.com,malwarebytes.com'; } else if (location.href.indexOf('https://preprod-www.malwarebytes.com') === 0) { plausibleDataDomain = 'staging-www.malwarebytes.com'; } let script = document.createElement('script'); script.defer = true; script.src = 'https://plausible.io/js/script.js'; script.dataset.domain = plausibleDataDomain; document.head.appendChild(script); })(); </script> <body class="page-template page-template-templates page-template-page-left-sidebar page-template-templatespage-left-sidebar-php page page-id-86834 wp-custom-logo"> <div id="page" class="site"> <a class="skip-link screen-reader-text" href="#primary">Skip to content</a> <header id="masthead" class="site-header"> <div class="container"> <div class="site-header__top"> <!-- Search --> <div class="site-header-searchbox"> <button class="searchbox-nav" aria-label="Search in MalwareBytes">Search</button> <div class="search-modal"> <label>Search Malwarebytes.com</label> <div class="custom-search-form"> <form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Type to search..." value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </div> <!-- Search --> <ul id="secondary-menu" class="secondary-menu u-flex-center"><li id="menu-item-2914" class="signin-items menu-item menu-item-type-custom menu-item-object-custom menu-item-2914"><a href="https://my.malwarebytes.com/en/login" id="cta-en-us-utilbar-my_malwarebytes_com_en_login-click">Sign In</a></li> </ul> </div> <div class="site-header__bottom u-flex-columns"> <div class="site-header__branding u-flex-column u-flex-col-lg-3 u-flex-col-9"> <a href="https://www.malwarebytes.com/" rel="home" id="cta-navbar-company-logo-en"> <svg width="178" height="28" viewBox="0 0 179 28" fill="none" xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" clip-rule="evenodd" d="M116.961 7.66164V0.648703C116.961 0.48192 116.826 0.35215 116.652 0.389163L114.622 0.686163C114.487 0.686163 114.41 0.815933 114.41 0.945703V21.3705C114.41 21.5002 114.507 21.6304 114.622 21.6304C116.381 22.0198 118.585 22.187 119.958 22.187C125.776 22.187 126.568 19.5153 126.568 16.6033V11.223C126.568 8.14371 125.022 6.56729 122.026 6.56729C119.861 6.56729 118.063 7.12383 117.058 7.62463L116.961 7.66164ZM123.978 16.6961C123.978 18.7737 123.321 20.0349 120.151 20.0349C119.088 20.0349 118.044 19.9421 117.019 19.8311H116.981V9.90611H117.019C117.947 9.47934 119.88 8.75557 121.388 8.75557C123.167 8.73729 123.978 9.49762 123.978 11.149V16.6961Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M128.038 6.86377C127.864 6.86377 127.728 7.031 127.767 7.19778L132.657 21.6678C132.696 21.7976 132.793 21.8346 132.928 21.8346H133.508C133.682 21.8346 133.817 22.0014 133.779 22.1686L131.846 27.5855C131.807 27.7523 131.942 27.9195 132.116 27.9195H133.914C134.049 27.9195 134.126 27.8268 134.185 27.7523L136.35 21.8716L141.414 7.19778C141.453 7.031 141.317 6.86377 141.143 6.86377H139.21C139.075 6.86377 138.998 6.95653 138.94 7.031L134.841 19.2561C134.745 19.5157 134.397 19.5157 134.319 19.2561L130.299 7.031C130.183 6.95653 130.086 6.86377 129.97 6.86377H128.038Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M154.114 16.6773C154.114 20.4433 156.047 22.1686 160.28 22.1686C162.078 22.1686 164.069 21.8716 165.519 21.4078C165.654 21.3708 165.731 21.2411 165.694 21.1113L165.422 19.6642C165.383 19.4974 165.249 19.4047 165.074 19.46C163.354 19.8867 161.807 20.091 160.454 20.091C157.187 20.091 156.627 18.9962 156.627 16.6585V15.6012C156.627 15.434 156.762 15.3412 156.897 15.3412H165.712C165.886 15.3412 165.983 15.2114 165.983 15.0817V12.2802C165.983 8.47765 164.088 6.65953 160.126 6.65953C156.182 6.56678 154.114 8.44064 154.114 12.1505V16.6773ZM160.184 8.6449C162.561 8.6449 163.528 9.60948 163.528 11.9837V13.041C163.528 13.2078 163.393 13.3006 163.257 13.3006H156.917C156.743 13.3006 156.646 13.1708 156.646 13.041V11.9837H156.665C156.665 9.66522 157.767 8.6449 160.184 8.6449Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M170.912 10.6299C170.912 9.18277 171.318 8.68197 173.638 8.68197C174.74 8.68197 176.324 8.81174 177.658 9.07128C177.832 9.10874 177.967 8.97852 177.967 8.81174L178.103 7.32719C178.103 7.19742 178.006 7.06765 177.891 7.03064C176.653 6.73364 175.165 6.56641 173.754 6.56641C169.829 6.56641 168.38 7.6612 168.38 10.5928C168.38 13.6717 168.728 14.4507 172.613 15.3783C175.744 16.1021 175.957 16.2688 175.957 17.9942C175.957 19.6085 175.551 20.1093 172.961 20.1093C171.724 20.1093 170.139 19.9055 168.824 19.6085C168.65 19.5715 168.515 19.6455 168.476 19.8128L168.206 21.2041C168.167 21.3339 168.244 21.4637 168.38 21.5007C169.656 21.9274 171.589 22.2244 173.097 22.2244C177.639 22.2244 178.47 20.7773 178.47 17.9014C178.49 14.692 177.871 14.321 173.638 13.3006C170.989 12.6705 170.912 12.3735 170.912 10.6299Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M51.4119 7.12329C51.3732 6.95651 51.5085 6.78928 51.6829 6.78928H54.8145C54.9494 6.78928 55.0851 6.88204 55.0851 6.99352L56.7664 15.7862C56.8051 16.0837 57.211 16.0837 57.2884 15.8237L60.0141 6.97479C60.0524 6.84502 60.1494 6.771 60.2847 6.771H63.9966C64.1315 6.771 64.2085 6.86375 64.2668 6.97479L66.9925 15.8237C67.0891 16.0837 67.4758 16.0837 67.5145 15.7862L69.1958 6.99352C69.2345 6.86375 69.3315 6.78928 69.4668 6.78928H72.5984C72.772 6.78928 72.9072 6.95651 72.8685 7.12329L70.0271 21.7231C69.9884 21.8529 69.8922 21.9273 69.7565 21.9273H65.6588C65.523 21.9273 65.4456 21.8346 65.3878 21.7231L62.3919 11.9096C62.2949 11.6501 61.9469 11.6501 61.8699 11.9096L58.874 21.7231C58.8353 21.8529 58.7383 21.9273 58.603 21.9273H54.5048C54.3695 21.9273 54.273 21.8529 54.2342 21.7231L51.4119 7.12329Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M47.8359 16.8631V5.89956V1.57656C47.8359 1.40978 47.7006 1.27956 47.527 1.31702L44.1248 1.7808C43.9895 1.7808 43.9121 1.91102 43.9121 2.04079V2.17056V5.89956V17.2712C43.9121 20.7036 46.0771 22.2247 48.9764 22.2247C49.2862 22.2247 50.2915 22.1873 50.8709 22.1315C51.0062 22.1315 51.1415 22.0018 51.1415 21.872V19.4603C51.1415 19.2935 51.0062 19.2008 50.8326 19.2008C50.4459 19.145 49.9239 19.145 49.692 19.145C48.2809 19.145 47.8359 18.5515 47.8359 16.8631Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M93.687 12.1138C93.5908 12.1508 93.5521 12.2435 93.5521 12.318V21.6677C93.5521 21.8349 93.4164 21.9277 93.2811 21.9277H89.879C89.705 21.9277 89.6084 21.7975 89.6084 21.6677V7.58742C89.6084 7.45765 89.705 7.32788 89.8211 7.32788L92.6434 6.86365C92.8174 6.82664 92.9527 6.95641 92.9527 7.06789L93.088 8.03247C93.1267 8.23672 93.3585 8.32947 93.5325 8.1997C94.4217 7.64316 95.8333 6.93812 96.9734 6.54837C97.1474 6.51136 97.321 6.58583 97.321 6.75261L97.6307 9.72082C97.6885 9.90634 97.6116 9.99909 97.5145 10.0919C96.1034 10.6854 94.9633 11.316 93.687 12.1138Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M148.373 18.3841V9.20117C148.373 9.03439 148.508 8.94163 148.643 8.94163H152.355C152.491 8.94163 152.625 8.84888 152.625 8.68209L152.8 7.19799C152.8 7.03076 152.664 6.90099 152.529 6.90099H148.643C148.469 6.90099 148.373 6.77122 148.373 6.641V3.15415C148.373 2.98692 148.238 2.85671 148.064 2.89417L146.034 3.19117C145.899 3.19117 145.822 3.32049 145.822 3.45026V6.65973C145.822 6.82696 145.686 6.91972 145.551 6.91972H143.347C143.173 6.91972 143.076 7.04949 143.076 7.17926V8.66336C143.076 8.83015 143.212 8.9229 143.347 8.9229H145.551C145.725 8.9229 145.822 9.05312 145.822 9.18289V18.7551C145.822 21.1668 146.923 22.1314 149.649 22.1314C150.268 22.1314 150.886 22.0943 151.505 21.9646C151.64 21.9276 151.717 21.8348 151.717 21.705V20.2209C151.717 20.0537 151.544 19.9239 151.408 19.9609C150.905 20.0724 150.461 20.1094 150.055 20.1094C148.469 20.1094 148.373 19.4419 148.373 18.3841Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M105.672 6.3999C104.126 6.3999 102.946 6.65944 102.019 7.06793C99.8538 8.08825 99.1582 10.0732 99.1582 12.2619V16.2879C99.1582 19.8496 100.782 22.0383 105.498 22.1311H106.6C107.876 22.1311 109.209 22.0013 110.428 21.8341C110.563 21.7971 110.698 21.6677 110.64 21.538V21.4077L110.331 19.3301C109.132 19.4599 108.088 19.4973 106.89 19.4973C103.991 19.4973 103.102 18.6995 103.102 16.9929V16.4916V15.7871H111.607C111.781 15.7871 111.877 15.6568 111.877 15.5271V14.377V12.5214C111.839 10.0919 111.239 7.92102 108.939 6.95644C108.108 6.62243 107.045 6.3999 105.672 6.3999ZM108.088 13.2269H103.063V11.9092C103.063 10.4625 103.72 9.49792 105.672 9.49792C105.885 9.49792 106.117 9.49792 106.33 9.53538C107.78 9.73918 108.359 10.685 108.359 11.9092V12.9674C108.359 13.1342 108.224 13.2269 108.088 13.2269Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M12.4228 24.5059C12.5964 24.5059 12.7317 24.3694 12.7317 24.194C12.7317 24.0571 12.6351 23.8817 12.4616 23.8817H12.3645L12.1518 23.8428C8.57566 23.1404 5.92779 19.9218 5.92779 16.1565C5.92779 14.5576 6.41108 13.036 7.24193 11.8074C7.37767 11.6316 7.58994 11.4952 7.82224 11.7099L13.4669 17.4831C13.5047 17.522 13.6017 17.5806 13.6791 17.5806C13.7757 17.5806 13.8531 17.5417 13.8919 17.4831L19.5747 11.7488C19.7875 11.5341 19.9811 11.5735 20.0972 11.7877C20.9281 13.036 21.4113 14.5383 21.4113 16.1373C21.4113 18.1461 20.6575 19.9608 19.4199 21.3459C19.3816 21.3848 19.3238 21.4434 19.285 21.4824C19.285 21.5213 19.2463 21.5799 19.2463 21.6188C19.2463 21.7947 19.3816 21.9311 19.5556 21.9311H19.5943C19.633 21.9311 19.6909 21.8922 19.7296 21.8922C27.2682 18.6928 26.9207 11.1247 26.9207 11.1247C26.9207 6.8136 24.8905 2.93201 21.7593 0.493699C21.6241 0.396166 21.4113 0.396166 21.3143 0.532618L13.9114 8.10121C13.7757 8.23767 13.563 8.23767 13.4281 8.10121L5.96607 0.532618C5.83078 0.396166 5.65722 0.396166 5.52194 0.493699C2.44819 2.93201 0.418457 6.75499 0.418457 11.1247C0.418457 18.0683 5.6185 23.8034 12.3263 24.5059H12.4228Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M29.5881 6.78923C29.4528 6.82669 29.3175 6.95646 29.3753 7.08623L29.6846 9.36813C29.7233 9.4979 29.8204 9.62767 29.9935 9.62767C31.2698 9.4979 32.1011 9.46089 33.3961 9.46089C36.2954 9.46089 37.185 10.2582 37.185 11.9653V12.9861C37.185 13.1529 37.0497 13.2456 36.914 13.2456H33.2604C30.0518 13.2456 28.1382 14.8033 28.1382 17.6418C28.1382 20.2577 30.2453 22.1311 33.4352 22.1311C35.4258 22.1311 36.2188 21.8345 36.8757 21.241C37.0497 21.0738 37.359 21.2035 37.359 21.4078V21.612C37.359 21.7788 37.4943 21.8716 37.6296 21.8716H40.8381C41.0121 21.8716 41.1092 21.7418 41.1092 21.612V12.0764C41.1474 8.3108 38.4221 6.49268 33.7828 6.49268C32.4104 6.49268 30.9605 6.58543 29.5881 6.78923ZM33.7828 19.4786C32.1594 19.4786 31.3085 18.8851 31.3085 17.6605C31.3085 16.3062 32.1977 15.7496 33.7828 15.7496H36.914C37.0884 15.7496 37.185 15.8794 37.185 16.0096V16.3062H37.2233C37.2233 18.2171 35.9087 19.4786 33.7828 19.4786Z" fill="#0D3ECC"/> <path fill-rule="evenodd" clip-rule="evenodd" d="M75.2463 6.78923C75.111 6.82669 74.9757 6.95646 75.0335 7.08623L75.3428 9.36813C75.3815 9.4979 75.4781 9.62767 75.6517 9.62767C76.928 9.4979 77.7593 9.46089 79.0543 9.46089C81.9536 9.46089 82.8432 10.2582 82.8432 11.9653V12.9861C82.8432 13.1529 82.7074 13.2456 82.5722 13.2456H78.919C75.71 13.2456 73.7964 14.8033 73.7964 17.6418C73.7964 20.2577 75.9036 22.1311 79.093 22.1311C81.0836 22.1311 81.8766 21.8345 82.5334 21.241C82.7074 21.0738 83.0172 21.2035 83.0172 21.4078V21.612C83.0172 21.7788 83.1525 21.8716 83.2877 21.8716H86.4963C86.6703 21.8716 86.7673 21.7418 86.7673 21.612V12.0764C86.8635 8.3108 84.0803 6.49268 79.4406 6.49268C78.0686 6.49268 76.6187 6.58543 75.2463 6.78923ZM79.4406 19.4786C77.8171 19.4786 76.9663 18.8851 76.9663 17.6605C76.9663 16.3062 77.8554 15.7496 79.4406 15.7496H82.5722C82.7466 15.7496 82.8432 15.8794 82.8432 16.0096V16.3062H82.8815C82.8815 18.2171 81.5669 19.4786 79.4406 19.4786Z" fill="#0D3ECC"/> </svg> </a> </div> <div class="site-header__bottom-right u-flex-column u-flex-col-lg-9 u-flex-col-3"> <button class="menu-toggle" aria-label="Menu" aria-controls="primary-menu" aria-expanded="false"> <span class="menu-toggle-bar menu-toggle-bar1"></span> <span class="menu-toggle-bar menu-toggle-bar2"></span> <span class="menu-toggle-bar menu-toggle-bar3"></span> </button> <div class="site-header__nav"> <nav id="site-navigation" class="main-navigation"> <ul id="primary-menu" class="primary-menu u-flex-center"><li id="menu-item-2906" class="personal-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2906 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-personal-click">Personal</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex" style="padding-bottom:0"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:29%"> <p>&lt; Products</p> <div class="wp-block-group alignfull is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-4ed3bf9a-9621-4f6d-8aba-9a5850ee5951"><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Computer Protection</strong></div><ul><li><a id="cta-en-us-navbar-personal-malwarebytes-premium-click" href="https://www.malwarebytes.com/premium">Premium Security ></a></li><li><a id="cta-en-us-navbar-_getprotection-click" href="https://www.malwarebytes.com/getprotection">Free Antivirus ></a></li><li><a id="cta-en-us-navbar-_getprotection-click2" href="https://www.malwarebytes.com/solutions/virus-scanner">Free Virus Scan ></a></li></ul></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Mobile Protection</strong></div><ul><li><a id="cta-en-us-navbar-_ios-click" href="https://www.malwarebytes.com/ios">iOS Security ></a></li><li><a id="cta-en-us-navbar-_android-click" href="https://www.malwarebytes.com/android">Android Security ></a></li></ul></div></div> </div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:29%"> <div class="wp-block-group alignfull is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-4ed3bf9a-9621-4f6d-8aba-9a5850ee5951"><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Identity Protection</strong></div><ul><li><a id="cta-en-us-navbar-_identity_theft_protection-click" href="https://www.malwarebytes.com/identity-theft-protection">Identity Theft Protection ></a></li><li><a id="cta-en-us-navbar-digital-footprint-scanner-click" href="https://www.malwarebytes.com/digital-footprint">Digital Footprint Scanner ></a></li><li><a id="cta-en-us-navbar-personal-data-remover-click" href="https://www.malwarebytes.com/personal-data-remover">Personal Data Remover ></a></li></ul></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0d3ecc"><strong>Privacy Protection</strong></div><ul><li><a id="cta-en-us-navbar-_vpn-click" href="https://www.malwarebytes.com/vpn" data-type="link" data-id="https://www.malwarebytes.com/vpn">VPN ></a></li><li><a id="cta-en-us-navbar-_adwcleaner-click" href="https://www.malwarebytes.com/adwcleaner">AdwCleaner ></a></li><li><a id="cta-en-us-navbar-_browserguard-click" href="https://www.malwarebytes.com/browserguard">Browser Guard ></a></li></ul></div></div> </div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:37%"> <div class="wp-block-group alignfull flex-direction-row is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-3 wp-block-group-is-layout-flex"> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-d24ba127-7e50-44f9-8919-360f85d19902" style="background-color:#ffffff"><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;"><span data="#191919" class="qubely-text-has-color" style="color: #191919;">Have a current computer infection?</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-clean-your-device-now-click" href="https://dev-www.malwarebytes.com/getprotection"><strong>Clean your device now</strong></a></div></div><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data="#191919" class="qubely-text-has-color" style="color: #191919;"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;">Try our antivirus with a free, full-featured 14-day trial</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-download-now-click" href="https://dev-www.malwarebytes.com/getprotection"><strong>Download now</strong></a></div></div><div class="menu-links__item"><p class="menu-links__desc" style="color:#135e96"><span data="#191919" class="qubely-text-has-color" style="color: #191919;"><span data-fontsize="18" class="qubely-custom-font" style="font-size: 18px;">Find the right cyberprotection for you</span></span></p><div class="menu-links__cta" style="color:#135e96"><a id="cta-en-us-navbar-see-our-plans-click" href="https://dev-www.malwarebytes.com/pricing"><strong>Compare plans and pricing</strong></a></div></div></div> </div> </div> </div> </div></li> <li id="menu-item-2907" class="business-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2907 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-business-click">Business</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:25%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:35%"> <p>&lt; Business</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-f01e317a-5669-417c-ae3d-5bae36e32f8c"><div class="menu-links__item"><div class="menu-links__title" style="color:#0D3ECC"><strong><a id="cta-en-us-navbar-business-teams-click" href="https://www.malwarebytes.com/teams">Teams ></a></strong></div><div class="menu-links__subtitle">Simple to manage protection for 20 or fewer devices</div></div><div class="menu-links__item"><div class="menu-links__title" style="color:#0D3ECC"><strong><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-mb-nav-threatdown">ThreatDown ></a></strong></div><div class="menu-links__subtitle">Award-winning endpoint security for small and medium businesses</div></div></div> </div> </div> </div></li> <li id="menu-item-2908" class="pricing-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2908 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-pricing-click">Pricing</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"> <p>&lt; Pricing</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-8b91929a-d4ec-4127-b3f4-08b5703b82f6"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-personal-pricing-click" href="https://www.malwarebytes.com/pricing" data-type="page" data-id="3844">Personal pricing</a></div><p class="menu-links__desc">Protect your personal devices and data</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-small-office-home-office-pricing-click" href="https://www.malwarebytes.com/pricing/teams" data-type="page" data-id="406">Small office/home office pricing</a></div><p class="menu-links__desc">Protect your team&#8217;s devices and data</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-pricing-business-pricing-click" href="https://www.threatdown.com/pricing/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cat-en-us-navbar-pricing-business-pricing-click" data-type="page" data-id="124">Business pricing (5+ employees)</a></div><p class="menu-links__desc">Step up your corporate endpoint security. Save up to 45%</p></div></div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> </div> </div></li> <li id="menu-item-2909" class="partners-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2909 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-partners-click">Partners</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"> <p>&lt; Partners</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-e13d480b-8377-4493-b67e-2fa03815fbb5"><div class="menu-links__item"><div class="menu-links__title"><br><a id="cta-navbar-partners-explore-partnerships-en-test" href="https://www.malwarebytes.com/partners">Malwarebytes</a></div><ul><li><a href="https://www.malwarebytes.com/affiliates" data-type="link" data-id="https://www.malwarebytes.com/affiliates">Affiliate partner ></a></li><li><a href="https://www.malwarebytes.com/techbench">Computer repair ></a><br></li></ul></div><div class="menu-links__item"><div class="menu-links__title"><a href="https://www.threatdown.com/partner-program/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-explore-partnerships-en-test" target="_blank" rel="noreferrer noopener">ThreatDown: Malwarebytes for Business</a></div><ul><li><a id="cta-navbar-partners-solution-providers-en-test" href="https://www.threatdown.com/partner-program/partner-reseller/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-solution-providers-en-test" target="_blank" rel="noreferrer noopener">Resellers</a> ></li><li><a id="cta-navbar-partners-managed-service-providers-en-test" href="https://www.threatdown.com/partner-program/msp/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-partners-managed-service-providers-en-test" data-type="page" data-id="3311" target="_blank" rel="noreferrer noopener">Managed Service Providers (MSP/ISS) ></a></li></ul></div></div> </div> <div class="wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:34%"></div> </div> </div></li> <li id="menu-item-2910" class="resources-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2910 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-resources-click">Resources</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex" style="padding-right:var(--wp--preset--spacing--80);padding-left:0"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:34.48%"> <p>&lt; Resources</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-d6a9ae27-5550-4478-b20f-6394817e1ef7"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-_resources-learn-cybcersecurity-click" href="https://www.malwarebytes.com/blog"><img decoding="async" width="130" height="16" class="wp-image-119531" style="width: 130px;" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png" alt="Malwarebytes Labs" srcset="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png 159w, https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/Malwarebytes_Labs_logo_Color-2.png?resize=150,19 150w" sizes="(max-width: 130px) 100vw, 130px" /></a></div><ul><li><a id="cta-en-us-navbar-_antivirus-click" href="https://www.malwarebytes.com/glossary">Security terms glossary ></a></li><li><a id="cta-en-us-navbar-_malware-click" href="https://www.malwarebytes.com/blog/threats">Threat Center ></a></li><li><a href="https://www.malwarebytes.com/blog">Cybersecurity News ></a></li></ul></div><div class="menu-links__item"><ul><li><a id="cta-en-us-navbar-_glossary-click" href="https://www.malwarebytes.com/company">About Malwarebytes ></a></li><li><a id="cta-en-us-navbar-_blog_threats-click" href="https://www.malwarebytes.com/press/">Press ></a></li><li><a href="https://www.malwarebytes.com/jobs">Careers ></a></li></ul></div></div> </div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:32.19%"> <p></p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-0a8428cf-74da-4b5d-a0ed-6cf810a8b368"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-en-us-navbar-_resources-business-click" href="https://www.malwarebytes.com/cybersecurity">Cybersecurity Resource Center</a></div><ul><li><a id="cta-en-us-navbar-_resources-click" href="https://www.malwarebytes.com/cybersecurity/basics/antivirus">Antivirus ></a></li><li><a href="https://www.malwarebytes.com/malware">Malware ></a></li><li><a id="cta-en-us-navbar-_resources_casestudies-click" href="https://www.malwarebytes.com/ransomware">Ransomware ></a></li><li><a href="https://www.malwarebytes.com/phishing">Phishing ></a></li><li><a href="https://www.malwarebytes.com/cybersecurity">See all articles ></a></li></ul></div></div> </div> </div> </div></li> <li id="menu-item-2911" class="support-menu-class menu-item menu-item-type-custom menu-item-object-custom menu-item-2911 menu-item-has-megamenu"><a href="#" id="cta-en-us-navbar-support-click">Support</a><div class="megamenu-wrap"> <div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex"> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:30%"></div> <div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:35%"> <p>&lt; Support</p> <div class="wp-block-malware-bytes-menu-links menu-links layout-1 has-item-border" id="menu-links-8b91929a-d4ec-4127-b3f4-08b5703b82f6"><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-personal-click" href="https://support.malwarebytes.com/hc/en-us" data-type="page" data-id="3844">Malwarebytes Personal Support</a></div><p class="menu-links__desc">Malwarebytes and Teams Customers</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-Threatdown-business-click" href="https://support.threatdown.com/hc/en-us/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-navbar-support-Threatdown-business-click" data-type="page" data-id="406">ThreatDown Business Support</a></div><p class="menu-links__desc">Nebula and Oneview Customers</p></div><div class="menu-links__item"><div class="menu-links__title"><a id="cta-navbar-support-community-forums-click" href="https://forums.malwarebytes.com/" data-type="page" data-id="124">Community Forums</a></div></div></div> </div> </div> </div></li> </ul> </nav><!-- #site-navigation --> <div class="site-header__actions"> <a href="#" id="cta-navbar-freedownload-main-en-test" class="mb-free-download-btn btn-main btn-primary-yellow u-text-transform-upper">Free Download</a> </div> <ul id="secondary-menu-mob" class="secondary-menu u-flex-direction-column u-display-none@min-1150"></ul> <!-- Search HTML Mobile --> <div class="site-header-searchbox"> <button class="searchbox-nav-mobile" aria-label="Search in MalwareBytes">Search</button> <button class="searchbox-nav" aria-label="Search in MalwareBytes">Search</button> <div class="search-modal"> <label>Search Malwarebytes.com</label> <div class="custom-search-form"> <form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Type to search..." value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </div> <!-- Search --> </div> </div> </div> </div> </header><!-- #masthead --> <main id="primary" class="site-main"> <article id="post-86834" class="malware-bytes-post-article post-86834 page type-page status-publish hentry page_category-left-navigation"> <section id="hero"> <div class="wp-block-malware-bytes hero-banner-v2 layout-2" id="hero-banner-v2-d067378c-bf31-41e5-8e42-8c8d91684bcb"> <div class="hero-banner-v2-main"> <div class="hero-banner-v2__content"> <div class="container"> <h1 class="heading-text">Exploit</h1> <p class="desc-text">Exploits take advantage of software vulnerabilities, hidden in the code of the OS and its applications, which cybercriminals use to gain illicit access to your system.<br><a href="https://www.malwarebytes.com/mac-download/"></a></p> <p class="download-btn-one"><a href="https://www.malwarebytes.com/mac-download">DOWNLOAD FREE ANTIVIRUS</a></p> </div> </div> </div> </div> </section> <section id="content" class="left-nav-content-section"> <div class="container"> <div class="row"> <div class="left-side-nav"> <nav id="fixed-side-nav"> <strong>Exploits</strong> <p class="hidden-sm hidden-xs" id="cta-mac-antivirus-left-nav-linkto-pillar-hub-en">Exploits</p> <p class="visible-lg visible-md"><strong>JUMP TO</strong></p> <p class="pillar-page-title"><strong>Exploits</strong> <span class="visible-xs visible-sm glyphicon glyphicon-triangle-bottom glyphicon-triangle-top"></span></p> <ul id="pillar-page-sections" class="nav"> <li class=""><a href="#what-you-need-to-know-about-computer-exploits">What you need to know about computer exploits</a> </li> <li class=""><a href="#what-is-an-exploit">What is an exploit? Exploit definition</a> </li> <li class=""><a href="#what-is-a-zero-day-exploit">What is a zero-day exploit?</a> </li> <li class=""><a href="#what-is-the-history-of-exploits">History of computer exploits</a> </li> <li class=""><a href="#exploits-on-mobile-android-and-ios">Exploits on mobile: Android and iOS</a> </li> <li class=""><a href="#how-can-i-protect-myself-from-exploits">How can I protect myself from exploits?</a> </li> <li class=""><a href="#how-do-exploits-affect-my-business">How do exploits affect my business?</a> </li> <li class=""><a href="#latest-news-on-exploits">News on exploits</a> </li> </ul> <div class="left-sidebar-menu-wrap"> <section id="block-17" class="widget widget_block"> <div class="container"> <div id="pillar-page-product-list"> <p><strong>Recent Articles</strong></p> <div id="nav-home-products-list"> <a href="https://www.malwarebytes.com/cybersecurity/basics/brute-force-attack" id="cta-antivirus-left-nav-forhome-bruteforceattack-en">Brute Force Attack</a><br> <a href="https://www.malwarebytes.com/cybersecurity/basics/firewall" id="cta-antivirus-left-nav-forhome-firewall-en">Firewall</a><br> <a href="https://www.malwarebytes.com/cybersecurity/basics/data-brokers" id="cta-antivirus-left-nav-forhome-databrokers-en">Data Brokers</a><br> <a href="https://www.malwarebytes.com/cybersecurity/basics/rcs-messaging" id="cta-antivirus-left-nav-forhome-rcsmessaging-en">RCS Messaging</a><br> <a href="https://www.malwarebytes.com/cybersecurity/basics/pig-butchering-scam" id="cta-antivirus-left-nav-forhome-pigbutcheringscam-en">Pig Butchering Scam</a><br> </div> </div> <p><strong><a href="https://www.malwarebytes.com/cybersecurity">Cybersecurity Basics</a></strong></p> <ul id="pillar-page-list"> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/2fa" id="cta-antivirus-left-nav-linkto-2fa-en">2FA</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/risks-of-ai-in-cyber-security" id="cta-antivirus-left-nav-linkto-ai-in-cybersecurity-en">AI in cybersecurity</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/antivirus" id="cta-antivirus-left-nav-linkto-antivirus-software-en">Antivirus Software</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/what-is-authentication" id="cta-antivirus-left-nav-linkto-what-is-authentication-en">What is authentication</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/catfishing" id="cta-antivirus-left-nav-linkto-catfishing-en">Catfishing</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/dark-web" id="cta-antivirus-left-nav-linkto-dark-web-en">Dark Web</a></li> <li><a href="https://www.malwarebytes.com/ddos" id="cta-antivirus-left-nav-linkto-ddos-en">DDoS</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/deepfakes" id="cta-antivirus-left-nav-linkto-deepfakes-en">Deepfakes</a></li> <li><a href="https://www.malwarebytes.com/doxxing" id="cta-antivirus-left-nav-linkto-doxxing-en">Doxxing</a></li> <li><a href="https://www.malwarebytes.com/exploits" id="cta-antivirus-left-nav-linkto-exploits-en">Exploits</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/hacker" id="cta-antivirus-left-nav-linkto-hacker-en">Hacker</a></li> <li><a href="https://www.malwarebytes.com/identity-theft" id="cta-antivirus-left-nav-linkto-identity-theft-en">Identity theft</a></li> <li><a href="https://www.malwarebytes.com/incognito-mode" id="cta-antivirus-left-nav-linkto-incognito-mode-en">Incognito Mode</a></li> <li><a href="https://www.malwarebytes.com/internet-security" id="cta-antivirus-left-nav-linkto-internet-security-en">Internet Security</a></li> <li><a href="https://www.malwarebytes.com/malware" id="cta-antivirus-left-nav-linkto-malware-en">Malware</a></li> <li><a href="https://www.malwarebytes.com/phishing" id="cta-antivirus-left-nav-linkto-phishing-en">Phishing</a></li> <li><a href="https://www.malwarebytes.com/cybersecurity/basics/pii" id="cta-antivirus-left-nav-linkto-pii:-personally-identifiable-information-en">PII: Personally Identifiable Information</a></li> <li><a href="https://www.malwarebytes.com/ransomware" id="cta-antivirus-left-nav-linkto-ransomware-en">Ransomware</a></li> <li><a href="https://www.malwarebytes.com/safe-search" id="cta-antivirus-left-nav-linkto-safesearch-en">SafeSearch</a></li> <li><a href="https://www.malwarebytes.com/what-is-smishing" id="cta-antivirus-left-nav-linkto-smishing-en">Smishing</a></li> <li><a href="https://www.malwarebytes.com/social-engineering" id="cta-antivirus-left-nav-linkto-social-engineering-en">Social Engineering</a></li> <li><a href="https://www.malwarebytes.com/spam" id="cta-antivirus-left-nav-linkto-spam-en">Spam</a></li> <li><a href="https://www.malwarebytes.com/swatting" id="cta-antivirus-left-nav-linkto-swatting-en">Swatting</a></li> <li><a href="https://www.malwarebytes.com/trojan" id="cta-antivirus-left-nav-linkto-trojan-en">Trojan</a></li> <li><a href="https://www.malwarebytes.com/what-is-vpn" id="cta-antivirus-left-nav-linkto-what-is-vpn-en">What is VPN</a></li> </ul> <div id="pillar-page-product-list"> <p><strong>Related Products</strong></p> <noscript> <p><a href="https://www.malwarebytes.com/for-home/products">View all Malwarebytes products</a></p> </noscript> <div id="nav-home-products-list"> <a href="https://www.malwarebytes.com/vpn-5" id="cta-antivirus-left-nav-forhome-vpn-en">VPN</a><br> <a href="https://www.malwarebytes.com/android" id="cta-antivirus-left-nav-forhome-antivirusforandroid-en">Antivirus for Android</a><br> <a href="https://www.malwarebytes.com/mwb-download" id="cta-antivirus-left-nav-forhome-freeantivirus-en">Free antivirus</a><br> <a href="https://www.malwarebytes.com/solutions/free-ad-blocker" id="cta-antivirus-left-nav-forhome-adblocker-en">Ad blocker</a><br> <a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-antivirus-left-nav-forhome-identitytheftprotection-en">Identity Theft Protection</a><br> <a href="https://www.malwarebytes.com/password-generator" id="cta-antivirus-left-nav-forhome-passwordgenerator-en">Password Generator</a><br> <a href="https://www.malwarebytes.com/solutions/dark-web-monitoring" id="cta-antivirus-left-nav-forhome-darkwebmonitoring-en">Dark Web Monitoring</a><br> </div> </div> </div> </section> </div> </nav> </div> <div id="right-side-content"> <div class="row"> <div class="col-md-12 col-sm-10 col-restyling"> <h2 class="wp-block-heading" id="what-you-need-to-know-about-computer-exploits">What you need to know about computer exploits</h2> <p>Computer exploits. What are they and why should you care?</p> <p>Have you ever noticed how software developers are forever patching and updating their software—sometimes releasing updates mere days after the initial software release?</p> <p>That’s because every piece of software you own and will ever own in your life will have vulnerabilities cybercriminals can find and take advantage of—in other words, “exploit.” There is no such thing as exploit-free software—there will always be holes. Computer software is about as solid as a block of Swiss cheese.</p> <p>By way of exploits, cybercriminals can gain access to your computer and steal sensitive information or install malware. Despite a slow-down in exploit activity, cybercriminals are continuing to fall back on this stealthy method of attack. With that in mind, now is the perfect time to educate ourselves on the topic of exploits and protect ourselves accordingly. So scroll down, read on, and learn everything you need to know about computer exploits.</p> <h2 class="wp-block-heading" id="what-is-an-exploit">What is an exploit? Exploit definition</h2> <p>A computer <a href="https://www.malwarebytes.com/blog/detections/exploit/">exploit</a> is a type of <a href="https://www.malwarebytes.com/malware">malware</a> that takes advantage of bugs or vulnerabilities, which cybercriminals use to gain illicit access to a system. These vulnerabilities are hidden in the code of the operating system and its applications just waiting to be discovered and put to use by cybercriminals. Commonly exploited software includes the operating system itself, browsers, Microsoft Office, and third-party applications. Sometimes exploits are packaged up by cybercriminal groups into what’s called an <a href="https://www.malwarebytes.com/blog/threats/exploit-kits/">exploit kit</a>. Exploit kits make it easier for criminals with limited technical knowledge to use exploits and spread malware.</p> <p>To gain a better understanding of <a href="https://www.malwarebytes.com/blog/101/2017/03/what-are-exploits-and-why-you-should-care/">what exploits are</a>, it may help to think of the expensive bicycle and laptop cylinder locks popular in the early 2000s. People paid upwards of $50 for these locks, thinking the locks kept their valuables secure, until someone posted a video online demonstrating how these locks could be picked in a matter of seconds using a cheap and readily available Bic pen.</p> <p>This forced the lock makers to update their locks and consumers had to upgrade to the new pick-proof locks. This is a tangible exploit of a physical security system. As it applies to software, cybercriminals are looking for clever tricks, just like the Bic pen guy, that will allow them access to other people’s computers, mobile devices and networks.</p> <p>Exploit attacks often start with <a href="https://www.malwarebytes.com/blog/threats/malspam/">malspam</a> and <a href="https://www.malwarebytes.com/blog/glossary/drive-by-download/">drive-by downloads</a>. Cybercriminals trick unsuspecting victims into opening an infected email attachment or clicking links that redirect to a malicious website. Infected attachments, often a Word document or PDF, will contain exploit code designed to take advantage of application weaknesses.</p> <p>Drive-by downloads take advantage of vulnerabilities in your browser, like Internet Explorer or Firefox for example, or the plug-ins running within your browser such as Flash. You may visit a website you’ve visited safely in the past, but this time the website has been hacked and you won’t even know it. Alternatively, you may click a malicious link in a spam email that takes you to a spoofed version of a familiar website.</p> <p>And in particularly tricky instances, you may visit a legitimate website displaying an advertisement or pop-up infected with malware—also known as <a href="https://www.malwarebytes.com/blog/101/2016/06/truth-in-malvertising-how-to-beat-bad-ads/">malvertising</a>. Upon visiting the site, malicious code on the webpage will work invisibly in the background to load malware onto your computer.</p> <p>Cybercriminals use exploits as a means to some malicious end, ranging from annoying problem to crippling nuisance. Cybercriminals may try to put your computer’s resources to work in a zombie <a href="https://www.malwarebytes.com/botnet">botnet</a> for the purposes of a <a href="https://www.malwarebytes.com/ddos">DDoS attack</a> or to mine Bitcoin (<a href="https://www.malwarebytes.com/cryptojacking">cryptojacking</a>).</p> <p>Alternatively, cybercriminals may try to install <a href="https://www.malwarebytes.com/adware">adware</a> and flood your desktop with ads. Cybercriminals may want to get on your system and steal data outright or install malware to secretly collect data from you over time (<a href="https://www.malwarebytes.com/spyware">spyware</a>). Finally, cybercriminals may install malware that encrypts all your files and demand payment in exchange for the encryption key (<a href="https://www.malwarebytes.com/ransomware">ransomware</a>).</p> <h2 class="wp-block-heading" id="what-is-a-zero-day-exploit">What is a zero-day exploit?</h2> <p>Zero-day! The one day a year we pause to recognize the humble little zero. If only that were true. Actually, a <a href="https://www.malwarebytes.com/zero-day">zero-day exploit</a>, also known as a zero-hour exploit, is a software vulnerability no one but the cybercriminal who created it knows about and for which there is no available fix. Once an exploit becomes public knowledge, it is no longer a zero-day. Sometimes a known exploit is referred to as an n-day exploit, indicating one or more days have passed since the exploit was publicized.</p> <p>Once a zero-day exploit becomes public information, software makers are in a race against criminals to patch the exploit before the criminals can take advantage and reap the benefits. Fortunately, researchers have scruples. If researchers find an exploit before criminals do, the researchers will usually report the flaw to the manufacturer and give them a chance to fix it before letting the public (and the criminals) at large know.</p> <p>Proactively looking for exploits has become a sport for some hackers. At the annual <a href="https://en.wikipedia.org/wiki/Pwn2Own" target="_blank" rel="nofollow noopener">Pwn2own</a> competition, exploit experts earn cash and prizes for successfully <a href="https://www.malwarebytes.com/hacker">hacking</a> into popular software across multiple categories, including web browsers and enterprise applications. As a demonstration of their interest in software security, Microsoft and VMware sponsored the Pwn2own event in 2018.</p> <p>Regarding software makers being proactive about finding and fixing exploits, David Sanchez, Malwarebytes Principal Research Engineer said, “It is true that Microsoft and other software makers are working very hard to secure their applications such as Office and exploiting them has become hard—almost impossible. Security guys and cybercriminals still find a way to exploit them successfully. 100 percent security is just an illusion, but Malwarebytes apps protect people as close as possible to that 100 percent.”</p> <figure class="wp-block-pullquote"><blockquote><p>“100 percent security is just an illusion. Malwarebytes apps protect people as close as possible to that 100 percent.”<br>&#8211; David Sanchez<br>Malwarebytes Principal Research Engineer</p></blockquote></figure> <h2 class="wp-block-heading" id="what-is-the-history-of-exploits">History of computer exploits</h2> <p>Exploits are as old as computing. As we’ve pointed out, all software has vulnerabilities and there have been some real doozies over the years. Here’s a quick rundown of some of the more notable computer exploits.</p> <p>Our exploration of the world’s greatest (i.e. worst) exploits starts in 1988 with the <a href="https://www.malwarebytes.com/blog/cybercrime/2012/07/the-malware-that-i-used-to-know/">Morris worm</a>, one of the first computer <a href="https://www.malwarebytes.com/blog/threats/worm/">worms</a> and exploits. Named after its creator Robert Tappan Morris, the eponymous worm was designed to figure out how big the internet was in those early formative years by using various vulnerabilities to access accounts and determine the number of computers connected to a network.</p> <p>The worm got out of hand, infecting computers multiple times, running several copies of the worm simultaneously until there were no resources left for legitimate users. The Morris worm had effectively become a DDOS attack.</p> <p>The SQL Slammer worm took the world by storm in 2003, enlisting somewhere around 250,000 servers running Microsoft’s SQL Server software into its botnet. Once a server was infected, it would use a scattershot style of attack, generating random IP addresses, and sending out infected code to those addresses. If the targeted server had SQL Server installed, it too would be infected and added to the botnet. As a result of SQL Slammer, <a href="https://www.zdnet.com/article/sql-slammer-worm-wreaks-havoc-on-internet/" target="_blank" rel="nofollow noopener">13,000 Bank of America ATMs</a> were knocked offline.</p> <p>The Conficker worm of 2008 is notable for a couple of reasons. First, it wrangled a lot of computers into its botnet—reportedly <a href="https://www.zdnet.com/article/opening-up-a-can-of-worms-why-wont-conficker-just-die-die-die/" target="_blank" rel="nofollow noopener">11 million devices</a> at its height. Second, Conficker popularized a type of subterfuge viruses use to avoid detection called a <a href="https://www.malwarebytes.com/blog/security-world/2016/12/explained-domain-generating-algorithm/">Domain Generating Algorithm (DGA)</a>. In short, the DGA technique allows a bit of malware to endlessly communicate with its <a href="https://www.malwarebytes.com/blog/glossary/cc/">command and control server (C&amp;C)</a> by generating new domains and IP addresses.</p> <p>Designed to attack Iran’s nuclear program, the 2010 <a href="https://www.malwarebytes.com/blog/threat-analysis/2013/11/stuxnet-new-light-through-old-windows/">Stuxnet</a> worm took advantage of multiple zero-day vulnerabilities in Windows to gain access to a system. From there, the worm was able to self-replicate and spread from one system to another.</p> <p>Discovered in 2014, the <a href="https://www.malwarebytes.com/blog/threat-analysis/2014/04/be-still-my-bleeding-heart-qa-on-the-heartbleed-bug/">Heartbleed exploit</a> was used to attack the encryption system that lets computers and servers talk back and forth privately. In other words, cybercriminals could use the exploit to eavesdrop on your digital conversation. The encryption system, called OPEN SSL, was used on <a href="https://www.zdnet.com/article/sql-slammer-worm-wreaks-havoc-on-internet/" target="_blank" rel="nofollow noopener">17.5% or half a million</a> “secure” web servers. That’s a lot of vulnerable data.</p> <p>Because this is an issue for the websites you visit (server-side), as opposed to an issue on your computer (client-side), it’s up to network administrators to patch this exploit. Most reputable websites patched for this exploit years ago, but not all, so it’s still an issue to be aware of.</p> <p>2017 was a banner year for ransomware. The <a href="https://www.malwarebytes.com/blog/detections/ransom-wannacrypt/">WannaCry and NotPetya</a> ransomware attacks took advantage of the <a href="https://www.malwarebytes.com/blog/cybercrime/2017/05/how-did-wannacry-ransomworm-spread/">EternalBlue/DoublePulsar</a> Windows exploits in order to sneak onto computers and hold data hostage. Combined, these two attacks caused <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/" target="_blank" rel="nofollow noopener">$18 billion in damages</a> around the world. The NotPetya attack in particular temporarily crippled—amongst many others—a Cadbury chocolate factory and the maker of Durex condoms. Hedonists around the world held their collective breath until the exploit was patched.</p> <p><a href="https://www.malwarebytes.com/blog/cybercrime/2017/09/equifax-breach-what-you-need-to-know/">The 2017 Equifax attack</a> could have been avoided if the credit bureau made a better effort to keep their software up-to-date. In this case, the software flaw cybercriminals used to break into Equifax’s data network was already well-known and a patch was available. Instead of patching things up, Equifax and their outdated software allowed cybercriminals to steal personal information for hundreds of millions of US customers. “Thanks.”</p> <p>Now, before you Apple users out there start thinking Macs are not susceptible to exploit-based attacks, consider the cringe-inducing <a href="https://www.wired.com/story/macos-high-sierra-hack-root/" target="_blank" rel="nofollow noopener">2017 root bug</a> that allowed cybercriminals to simply enter the word “root” into the username field and hit return twice to get full access to the computer. That bug was quickly fixed before cybercriminals could take advantage, but this just goes to show that any software can have exploitable bugs. To wit, we reported that <a href="https://www.malwarebytes.com/mac-antivirus/">Mac exploits are on the rise</a>. By the end of 2017, there was 270 percent more unique threats on the Mac platform than in 2016.</p> <p>As of late, there’s been little news in the world of browser exploits. On the other hand, <a href="https://www.malwarebytes.com/blog/malwarebytes-news/2018/10/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets/">Office exploit kits are trending upwards</a>. Since 2017 we’ve noticed a rise in the use of Office-based exploit kits. It was back in the fall of that year we first reported on multiple innovative Word exploits, including one hidden in <a href="https://www.malwarebytes.com/blog/threat-analysis/2017/09/cve-2017-0199-used-to-deliver-modified-rms-agent-rat/">bogus IRS notices</a> and another <a href="https://www.malwarebytes.com/zero-day">zero-day attack</a> hidden in Word documents—requiring little to no interaction from the victim to initiate.</p> <p>We’re now seeing a new type of Office exploit kit that <a href="https://www.malwarebytes.com/blog/threat-analysis/2018/07/new-macro-less-technique-used-distribute-malware/">doesn’t rely on macros</a>; i.e. special code embedded in the document, to do its dirty work. <a href="https://www.malwarebytes.com/blog/threat-analysis/2017/10/decoy-microsoft-word-document-delivers-malware-through-rat/">This exploit kit</a>, instead uses the document as a decoy while triggering an automatic download that deploys the exploit.</p> <p>More recently, cybercriminals are deploying <a href="https://www.malwarebytes.com/blog/threat-analysis/2018/08/fileless-malware-getting-the-lowdown-on-this-insidious-threat/">fileless malware</a>, so named because this type of malware doesn’t rely on code installed on the target computer to work. Instead, fileless malware exploits the applications already installed on the computer, effectively weaponizing the computer against itself and other computers.</p> <figure class="wp-block-pullquote"><blockquote><p>“Fileless malware exploits the applications already installed on the computer, effectively weaponizing the computer against itself and other computers.”</p></blockquote></figure> <h2 class="wp-block-heading" id="exploits-on-mobile-android-and-ios">Exploits on mobile: Android and iOS</h2> <p>The biggest concern for mobile users is installing apps that have not been approved by Google and Apple. Downloading apps outside the Google Play Store and Apple App Store means the apps haven’t been vetted by the respective companies. These untrusted apps might try and exploit vulnerabilities in iOS/Android to gain access to your mobile device, steal sensitive information, and perform other malicious actions.</p> <h2 class="wp-block-heading" id="how-can-i-protect-myself-from-exploits">How can I protect myself from exploits?</h2> <p>Exploits can be scary. Does that mean we should throw our routers out the window and pretend it’s the pre-internet computer Dark Ages? Certainly not. Here are a few tips if you want to get proactive about exploit protection.</p> <ol> <li><strong>Stay up-to-date.</strong> Do you regularly update your operating system and all the various applications you have installed? If you answered no, you might be a potential victim for cybercriminals. After a zero-day exploit becomes known to the software vendor and a <a href="https://www.malwarebytes.com/blog/101/2015/10/whats-patch-tuesday/">patch is released</a>, the onus is upon the individual user to patch and update their software. In fact, zero-day exploits become more dangerous and widespread after they become public knowledge, because a broader group of <a href="https://www.malwarebytes.com/blog/glossary/threat-actor/">threat actors</a> are taking advantage of the exploit. Check back with your software providers and see if there are any updates or patches available. If possible, go into your software settings and turn auto-updates on so these updates happen automatically in the background without any extra effort on your part. This will eliminate the amount of lag time between when a vulnerability is announced and when it’s patched. Cybercriminals prey on people who forget or just don’t know to update and patch their software.</li> <li><strong>Upgrade your software.</strong> In some cases, a software application becomes so old and unwieldy the software maker stops supporting it (<a href="https://www.malwarebytes.com/blog/glossary/abandonware/">abandonware</a>), which means any additional bugs that are discovered will not be fixed. Following closely on the previous bit of advice, make sure your software is still supported by the maker. If it isn’t, upgrade to the latest version or switch to something else that does the same thing.</li> <li><strong>Stay safe online.</strong> Make sure Microsoft SmartScreen or Google Safe Browsing are enabled for your web browser of choice. Your browser will check every site you visit against the blacklists maintained by Microsoft and Google and steer you away from sites known to dish up malware. Effective anti-malware tools like <a href="https://www.malwarebytes.com/products/">Malwarebytes</a>, for example, will also block bad sites, offering you multiple layers of protection.</li> <li><strong>Use it or lose it.</strong> Hackers gonna hack. There’s not much we can do about that. But if there’s no software, there’s no vulnerability. If you aren’t using the software anymore—delete it from your computer. Hackers can’t break into something that isn’t there.</li> <li><strong>Install authorized apps.</strong> When it comes to staying safe on your mobile device, stick to authorized apps only. There are times you might want to go outside of the App Store and Google Play Store, like when you’re beta-testing a new app, but you should be doubly sure you can trust the app maker. Generally speaking though, stick with approved apps that have been vetted by Apple and Google.</li> <li><strong>Use anti-exploit software.</strong> So you’ve taken all the necessary precautions to avoid exploit-based attacks. What about zero-day exploits? Remember, a zero-day exploit is a software vulnerability only the cybercriminals know about. There’s not much we can do to protect ourselves from the threats we don’t know. Or is there? A good anti-malware program, like <a href="https://www.malwarebytes.com/premium/">Malwarebytes for Windows</a>, <a href="https://www.malwarebytes.com/mac/">Malwarebytes for Mac</a>, <a href="https://www.malwarebytes.com/mobile/">Malwarebytes for Android</a>, or <a href="https://www.malwarebytes.com/ios/">Malwarebytes for iOS</a>, can proactively recognize and block malicious software from taking advantage of vulnerabilities on your computer using <a href="https://www.malwarebytes.com/blog/detections/heuristics/">heuristic analysis</a> of the attack. In other words, if the suspect software program is structured and behaves like malware, Malwarebytes will flag and quarantine it.</li> </ol> <h2 class="wp-block-heading" id="how-do-exploits-affect-my-business">How do exploits affect my business?</h2> <p>In many ways, your business presents a higher value target for cybercriminals and exploits than the individual consumer—more data to steal, more to hold for ransom, and more endpoints to attack.</p> <p>Take, for example, the Equifax data breach. In this case, cybercriminals used an <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638" target="_blank" rel="nofollow noopener">exploit in Apache Struts 2</a> to gain access to the Equifax network and escalate their user privileges. Once the attackers were on the network, they made themselves the system administrators, gaining access to sensitive data for millions of consumers. No one knows the full fallout from the Equifax attack, but it could end up costing the credit bureau millions of dollars. There’s a class action lawsuit in the works and <a href="https://www.inc.com/bill-murphy-jr/people-are-suing-equifax-in-small-claims-court-its-totally-brilliant-heres-why.html" target="_blank" rel="nofollow noopener">individuals are taking Equifax to small claims court</a> too, winning upwards of $8,000 per case.</p> <p>In addition to privilege escalation, exploits can be used to deploy other malware—as was the case with the NotPetya ransomware attack. NotPetya spread across the Internet attacking individuals and businesses alike. Using the <a href="https://www.malwarebytes.com/blog/news/2017/10/badrabbit-closer-look-new-version-petyanotpetya">EternalBlue and MimiKatz</a> Windows exploits, NotPetya got a foothold on a network and spread from computer to computer, locking down each endpoint, encrypting user data, and bringing business to a standstill. Computers, smartphones, VOIP desk phones, printers, and servers were all rendered useless. Total damages to businesses around the world have been estimated at 10 billion dollars.</p> <p>So how can you protect your business? You need to get rid of the weaknesses in your system with a good patch management strategy. Here’s some things to keep in mind as you figure out what’s best for your network.</p> <ul> <li>Implement network segmentation. Spreading your data onto smaller subnetworks reduces your attack surface—smaller targets are harder to hit. This can help contain a breach to only a few endpoints instead of your entire infrastructure.</li> <li>Enforce the principle of least privilege (PoLP). In short, give users the access level they need to do their jobs and nothing more. Again, this helps to contain damages from breaches or ransomware attacks.</li> <li>Stay up-to-date with updates. Keep an eye on Patch Tuesday and plan around it accordingly. The Microsoft Security Response Center maintains a blog with all the latest update info. You can also subscribe to their email newsletter to stay in the know about what’s being patched every month.</li> <li>Prioritize your updates. The day after Patch Tuesday is sometimes called (tongue firmly in cheek) Exploit Wednesday. Cybercriminals have been made aware of potential exploits and the race is on to update systems before the cybercriminals have a chance to attack. To expedite the patch process, you should consider launching updates at each endpoint from one central agent, as opposed to leaving it up to each end user to complete on their own time.</li> <li>Audit your updates after the fact. Patches are supposed to fix software, but sometimes patches end up breaking things. It’s worth following up and ensuring the patches you pushed out to your network didn’t make things worse and uninstall as necessary.</li> <li>Get rid of abandonware. Sometimes it’s hard to get rid of old software that’s past its expiration date—especially at a large business where the purchasing cycle moves with the urgency of a sloth, but discontinued software is truly the worst-case scenario for any network or system administrator. Cybercriminals actively seek out systems running outdated and obsolete software, so replace it as soon as possible.</li> <li>Of course, good endpoint security software is an essential part of any exploit protection program. Consider Malwarebytes. With <a href="https://www.malwarebytes.com/business/edr/">Malwarebytes Endpoint Protection</a> and <a href="https://www.malwarebytes.com/business/edr/">Malwarebytes Endpoint Detection and Response</a>, we have a solution for all your business security needs.</li> </ul> <p>Finally, if all this hasn’t sated your hunger for knowledge about exploits, you can always read more about <a href="https://www.malwarebytes.com/blog/?s=exploits">exploits on the Malwarebytes Labs</a> blog.</p> <h2 class="wp-block-heading" id="latest-news-on-exploits">News on exploits</h2> <ul> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/12/log4j-zero-day-log4shell-arrives-just-in-time-to-ruin-your-weekend/">Log4j zero-day “Log4Shell” arrives just in time to ruin your weekend</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/11/windows-installer-vulnerability-becomes-actively-exploited-zero-day/">Windows Installer vulnerability becomes actively exploited zero-day</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/03/patch-now-exchange-servers-attacked-by-hafnium-zero-days/">Patch now! Exchange servers attacked by Hafnium zero-days</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer/">Zoom zero-day discovery makes calls safer, hackers $200,000 richer</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/05/android-patches-for-4-in-the-wild-bugs-are-out-but-when-will-you-get-them/">Android patches for 4 in-the-wild bugs are out, but when will you get them?</a></li> <li><a href="https://www.malwarebytes.com/blog/malwarebytes-news/2021/04/take-action-multiple-pulse-secure-vpn-vulnerabilities-exploited-in-the-wild/">Take action! Multiple Pulse Secure VPN vulnerabilities exploited in the wild</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2021/02/update-now-chrome-patches-zero-day-that-was-exploited-in-the-wild/">Update now! Chrome patches zero-day that was exploited in the wild</a></li> <li><a href="https://www.malwarebytes.com/blog/malwarebytes-news/2021/02/big-patch-tuesday-microsoft-and-adobe-fix-in-the-wild-exploits/">Big Patch Tuesday: Microsoft and Adobe fix in-the-wild exploits</a></li> <li><a href="https://www.malwarebytes.com/blog/exploits-and-vulnerabilities/2020/11/update-your-ios-now-apple-patches-3-zero-day-vulnerabilities/">Update your iOS now! Apple patches three zero-day vulnerabilities</a></li> <li><a href="https://www.malwarebytes.com/blog/news/2020/06/a-zero-day-guide-for-2020">A zero-day guide for 2020: Recent attacks and advanced preventive techniques</a></li> </ul> <h3 class="wp-block-heading"><br>Exploit kit reviews:&nbsp;</h3> <p><a href="https://www.malwarebytes.com/blog/news/2019/05/exploit-kits-spring-2019-review">Exploit kits: spring 2019 review</a> <br><a href="https://www.malwarebytes.com/blog/news/2019/02/exploit-kits-winter-2019-review">Exploit kits: winter 2019 review</a> <br><a href="https://www.malwarebytes.com/blog/news/2018/10/exploit-kits-fall-2018-review">Exploit kits: fall 2018 review</a> <br><a href="https://www.malwarebytes.com/blog/news/2018/08/exploit-kits-summer-2018-review">Exploit kits: summer 2018 review</a> <br><a href="https://www.malwarebytes.com/blog/news/2018/06/exploit-kits-spring-2018-review">Exploit kits: spring 2018 review</a> <br><a href="https://www.malwarebytes.com/blog/news/2018/03/exploit-kits-winter-2018-review">Exploit kits: winter 2018 review</a> <br>Read more news about <a href="https://www.malwarebytes.com/blog/category/exploits-and-vulnerabilities">exploits and vulnerabilities</a> on the Malwarebytes Labs blog.&nbsp;</p> </div> </div> </div> </div> </div> </section> </article><!-- #post-86834 --> </main><!-- #main --> <span id="kadence-conversion-end-of-content"></span> <footer id="colophon" class="site-footer"> <div class="site-footer__top"> <div class="container"> <div class="site-footer__info"> <a class="footer-logo" href="https://www.malwarebytes.com/" rel="home" id="cta-navbar-footer-company-logo-en"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/footer-logo-1.svg" class="attachment-full size-full" alt="MalwareBytes-Footer-Logo" width="150" height="46" decoding="async" loading="lazy" /> </a> <p class="site-footer__description"> Cyberprotection for every one. </p> </div> <div class="site-footer__row u-flex-columns"> <div class="u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">COMPUTER SECURITY</p> <div class="menu-footer-computer-security-container"><ul id="menu-footer-computer-security" class="menu"><li id="menu-item-119904" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119904"><a href="https://www.malwarebytes.com/rootkit" id="cta-mb-footer-rootkit-scanner">Rootkit Scanner</a></li> <li id="menu-item-119905" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119905"><a href="https://www.malwarebytes.com/solutions/trojan-scanner" id="cta-mb-footer-trojan-scanner">Trojan Scanner</a></li> <li id="menu-item-119906" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119906"><a href="https://www.malwarebytes.com/solutions/free-antivirus" id="cta-mb-footer-free-antivirus">Free Antivirus</a></li> <li id="menu-item-119907" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119907"><a href="https://www.malwarebytes.com/solutions/virus-scanner" id="cta-mb-footer-virus-scan">Free Virus Scan</a></li> <li id="menu-item-119908" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119908"><a href="https://www.malwarebytes.com/premium" id="cta-mb-footer-premium-protection">Premium protection</a></li> </ul></div> <p style="font-style:normal;font-weight:500">MOBILE SECURITY</p> <div class="wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained" style="padding-bottom:var(--wp--preset--spacing--40)"><div class="widget widget_nav_menu"><div class="menu-footer-android-security-container"><ul id="menu-footer-android-security" class="menu"><li id="menu-item-119910" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119910"><a href="https://www.malwarebytes.com/android-antivirus" id="cta-mb-footer-android-security">Antivirus for Android</a></li> </ul></div></div> <figure class="wp-block-image size-large"><a href="https://go.onelink.me/app/516cebeb"><img loading="lazy" decoding="async" width="135" height="40" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/google_play_store_button.png?w=135" alt="google play store" class="wp-image-6309"/></a></figure> </div> <div class="wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained"><div class="widget widget_nav_menu"><div class="menu-footer-ios-security-container"><ul id="menu-footer-ios-security" class="menu"><li id="menu-item-119913" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119913"><a href="https://www.malwarebytes.com/ios" id="cta-mb-footer-ios-security">iOS Security and Spam Blocker</a></li> </ul></div></div> <figure class="wp-block-image size-large"><a href="https://apps.apple.com/US/app/id1327105431?mt=8"><img loading="lazy" decoding="async" width="120" height="40" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/08/apple_app_store_button_dark.png?w=120" alt="apple store icon" class="wp-image-6313"/></a></figure> </div> </div> <div class="u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">PRIVACY PROTECTION</p> <div class="menu-footer-privacy-protection-container"><ul id="menu-footer-privacy-protection" class="menu"><li id="menu-item-119921" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119921"><a href="https://www.malwarebytes.com/vpn" id="cta-mb-footer-privacy-vpn">Privacy VPN (Virtual Private Network)</a></li> <li id="menu-item-120239" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120239"><a href="https://www.malwarebytes.com/digital-footprint" id="cta-mb-footer-digital-footprint-scan">Digital Footprint Scan</a></li> <li id="menu-item-119923" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119923"><a href="https://www.malwarebytes.com/solutions/dark-web-monitoring" id="cta-mb-footer-dark-web-monitoring">Dark Web Monitoring</a></li> <li id="menu-item-119924" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119924"><a href="https://www.malwarebytes.com/adwcleaner" id="cta-mb-footer-adware-removal-adwcleaner">Adware Removal</a></li> <li id="menu-item-119925" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-119925"><a href="https://www.malwarebytes.com/browserguard" id="cta-mb-footer-adblocker-browserguard">Ad Blocker</a></li> </ul></div> <p style="font-style:normal;font-weight:500">IDENTITY PROTECTION</p> <div class="menu-footer-identity-protection-container"><ul id="menu-footer-identity-protection" class="menu"><li id="menu-item-120211" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120211"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-monitoring-alerts">Identity Monitoring &#038; Alerts</a></li> <li id="menu-item-120212" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120212"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-credit-monitoring-reporting">Credit Monitoring &#038; Reporting</a></li> <li id="menu-item-120213" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120213"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-recovery-resolution">Identity Recovery &#038; Resolution</a></li> <li id="menu-item-120214" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120214"><a href="https://www.malwarebytes.com/identity-theft-protection" id="cta-mb-footer-identity-theft-insurance">ID Theft Insurance</a></li> <li id="menu-item-120215" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120215"><a href="https://www.malwarebytes.com/personal-data-remover" id="cta-mb-footer-personal-data-remover-pdr">Personal Data Remover</a></li> </ul></div> </div> <div class="u-flex-column u-flex-col-lg-3 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">LEARN ABOUT CYBERSECURITY</p> <div class="menu-footer-learn-about-cybersecurity-container"><ul id="menu-footer-learn-about-cybersecurity" class="menu"><li id="menu-item-120251" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120251"><a href="https://www.malwarebytes.com/blog">Blog</a></li> <li id="menu-item-120244" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120244"><a href="https://www.malwarebytes.com/social-engineering">Social Engineering</a></li> <li id="menu-item-120220" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120220"><a href="https://www.malwarebytes.com/phishing">Phishing</a></li> <li id="menu-item-120221" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120221"><a href="https://www.malwarebytes.com/solutions/ransomware-protection">Ransomware</a></li> <li id="menu-item-120246" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120246"><a href="https://www.malwarebytes.com/malware">Malware</a></li> <li id="menu-item-120222" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120222"><a href="https://www.malwarebytes.com/cybersecurity/basics/antivirus">Antivirus</a></li> <li id="menu-item-120223" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120223"><a href="https://www.malwarebytes.com/what-is-vpn">What is a VPN?</a></li> <li id="menu-item-120224" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120224"><a href="https://www.malwarebytes.com/doxxing">Doxxing</a></li> </ul></div> <p style="font-style:normal;font-weight:500">PARTNER WITH MALWAREBYTES</p> <div class="menu-footer-partner-with-mb-container"><ul id="menu-footer-partner-with-mb" class="menu"><li id="menu-item-120226" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120226"><a href="https://www.malwarebytes.com/techbench" id="cta-mb-footer-computer-repair-techbench">Computer Repair</a></li> <li id="menu-item-120227" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120227"><a href="https://www.malwarebytes.com/affiliates" id="cta-mb-footer-affiliates">Affiliates</a></li> </ul></div> <p style="font-style:normal;font-weight:500">ADDRESS</p> <p class="address-text address-global">One Albert Quay<br>2nd Floor<br>Cork T12 X8N6<br>Ireland</p> <p class="address-text address-usa-ca hidden">3979 Freedom Circle<br>12th Floor<br>Santa Clara, CA 95054</p> </div> <div class="site-footer__col u-flex-column u-flex-col-lg-2 u-flex-col-sm-6"> <p style="font-style:normal;font-weight:500">ABOUT MALWAREBYTES</p> <div class="menu-footer-about-mb-container"><ul id="menu-footer-about-mb" class="menu"><li id="menu-item-120230" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120230"><a href="https://www.malwarebytes.com/jobs" id="cta-mb-footer-careers">Careers</a></li> <li id="menu-item-120231" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120231"><a href="https://www.malwarebytes.com/press/" id="cta-mb-footer-press">News and Press</a></li> <li id="menu-item-120232" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-120232"><a href="https://www.malwarebytes.com/secure" id="cta-mb-footer-vulnerability-discolsure">Vulnerability Disclosure</a></li> <li id="menu-item-120233" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120233"><a href="https://forums.malwarebytes.com/forum/122-false-positives" id="cta-mb-footer-false-positive">False Positive Report</a></li> <li id="menu-item-120234" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120234"><a href="https://forums.malwarebytes.com/" id="cta-mb-footer-forums">Forums</a></li> </ul></div> <p style="font-style:normal;font-weight:500">GET HELP</p> <div class="menu-footer-get-help-container"><ul id="menu-footer-get-help" class="menu"><li id="menu-item-120236" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120236"><a href="https://support.malwarebytes.com/hc/en-us">Help Center</a></li> <li id="menu-item-120237" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120237"><a href="https://my.malwarebytes.com">Sign in to MyAccount</a></li> </ul></div> <div class="wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained" style="background-color:#ffffff12;padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-bottom:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20)"> <figure class="wp-block-image size-large"><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&amp;utm_source=malwarebytes.com&amp;utm_medium=referral&amp;utm_content=cta-mb-footer-threatdown-logo"><img decoding="async" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/11/ThreatDown_Horizontal_Reverse-2-2.svg?w=1024" alt="Threatdown Logo" class="wp-image-98222"/></a></figure> <div class="widget widget_nav_menu"><div class="menu-footer-threatdown-container"><ul id="menu-footer-threatdown" class="menu"><li id="menu-item-120248" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120248"><a href="https://www.threatdown.com/?utm_campaign=mwb-referral&#038;utm_source=malwarebytes.com&#038;utm_medium=referral&#038;utm_content=cta-mb-footer-threatdown-endpoint-solution" id="cta-mb-footer-threatdown-endpoint-security-solution">Business Endpoint Security Solutions</a></li> <li id="menu-item-120249" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-120249"><a href="https://www.threatdown.com/partner-program/msp/?utm_campaign=mwb-referral&#038;utm_source=malwarebytes.com&#038;utm_medium=referral&#038;utm_content=cta-en-us-footer-partner-msp" id="https://www.threatdown.com/partner-program/msp/">Managed Service Provider (MSP) Program</a></li> </ul></div></div></div> </div> <div class="site-footer__connect u-flex-column u-flex-col-lg-3"> <ul class="site-footer__social-icons u-flex-center"> <li> <a href="https://twitter.com/malwarebytes" id="cta-footer-social-twitter-en" class="social socicon-twitter" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2024/01/x-logo.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Twitter icon" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Twitter</span> </a> </li> <li> <a href="https://www.facebook.com/Malwarebytes" id="cta-footer-social-facebook-en" class="social socicon-facebook" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-facebook.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon facebook" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Facebook</span> </a> </li> <li> <a href="https://www.linkedin.com/company/malwarebytes" id="cta-footer-social-linkedin-en" class="social socicon-linkedin" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-linkedin.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon Linkedin" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">LinkedIn</span> </a> </li> <li> <a href="https://www.youtube.com/user/Malwarebytes" id="cta-footer-social-youtube-en" class="social socicon-youtube" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-youtube.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon youtube" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Youtube</span> </a> </li> <li> <a href="https://www.instagram.com/malwarebytesofficial" id="cta-footer-social-instagram-en" class="social socicon-instagram-v2" target="_blank" rel="noopener"> <img width="1240" src="https://www.malwarebytes.com/wp-content/uploads/sites/2/2023/07/icon-instagram.svg?w=1240" class="attachment-social-icon-image size-social-icon-image" alt="Icon instagram" width="30" height="20" decoding="async" loading="lazy" /> <span class="screen-reader-text">Instagram</span> </a> </li> </ul> <div class="site-footer__newsletter"> <h2>Cybersecurity info you can’t live without</h2> <p>Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.</p> <form action="https://www.malwarebytes.com/newsletter/" class="newsletter-form"> <div class="newsletter-form__inline"> <label>Email Address</label> <input type="email" name="email" id="cta-footer-newsletter-input-email-en" placeholder="Email Address" required class="newsletter-form__email"> <input type="hidden" class="newsletter-form__pageurl" value="https://www.malwarebytes.com/exploits"> <input name="source" type="hidden" value=""> <input type="submit" value="Sign Up" class="newsletter-form__btn" id="cta-footer-newsletter-subscribe-email-en"> </div> <div class="newsletter-form__validate hidden"> <span></span> </div> </form> </div> </div> </div> </div> </div> <div class="site-footer__bottom"> <div class="container"> <div class="u-flex-columns"> <!--Weglot 4.2.9--><aside data-wg-notranslate="" class="country-selector weglot-dropdown close_outside_click closed weglot-shortcode wg-" tabindex="0" aria-expanded="false" aria-label="Language selected: English"><input id="wg67429975287f27.476374031732417909617" class="weglot_choice" type="checkbox" name="menu"/><label data-l="en" tabindex="-1" for="wg67429975287f27.476374031732417909617" class="wgcurrent wg-li weglot-lang weglot-language weglot-flags flag-0 en" data-code-language="en" data-name-language="English"><span class="wglanguage-name">English</span></label><ul role="none"><li data-l="de" class="wg-li weglot-lang weglot-language weglot-flags flag-0 de" data-code-language="de" role="option"><a title="Language switcher : German" class="weglot-language-de" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/de/exploits">Deutsch</a></li><li data-l="es" class="wg-li weglot-lang weglot-language weglot-flags flag-0 es" data-code-language="es" role="option"><a title="Language switcher : Spanish" class="weglot-language-es" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/es/exploits">Español</a></li><li data-l="fr" class="wg-li weglot-lang weglot-language weglot-flags flag-0 fr" data-code-language="fr" role="option"><a title="Language switcher : French" class="weglot-language-fr" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/fr/exploits">Français</a></li><li data-l="it" class="wg-li weglot-lang weglot-language weglot-flags flag-0 it" data-code-language="it" role="option"><a title="Language switcher : Italian" class="weglot-language-it" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/it/exploits">Italiano</a></li><li data-l="nl" class="wg-li weglot-lang weglot-language weglot-flags flag-0 nl" data-code-language="nl" role="option"><a title="Language switcher : Dutch" class="weglot-language-nl" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/nl/exploits">Nederlands</a></li><li data-l="pl" class="wg-li weglot-lang weglot-language weglot-flags flag-0 pl" data-code-language="pl" role="option"><a title="Language switcher : Polish" class="weglot-language-pl" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/pl/exploits">Polski</a></li><li data-l="pt-br" class="wg-li weglot-lang weglot-language weglot-flags flag-0 br" data-code-language="br" role="option"><a title="Language switcher : Brazilian Portuguese" class="weglot-language-pt-br" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/pt-br/exploits">Português Brasileiro</a></li><li data-l="ru" class="wg-li weglot-lang weglot-language weglot-flags flag-0 ru" data-code-language="ru" role="option"><a title="Language switcher : Russian" class="weglot-language-ru" role="option" data-wg-notranslate="" href="https://www.malwarebytes.com/ru/exploits">Русский</a></li></ul></aside> <div class="u-flex-column u-flex-col-lg-9 site-footer__bottom-right"> <ul id="menu-footer-bottom-menu" class="footer-bottom-menu u-flex-center"><li id="menu-item-2936" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2936"><a href="https://www.malwarebytes.com/legal" id="cta-en-us-footernavigation-legal-_legal-click">Legal</a></li> <li id="menu-item-2937" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2937"><a href="https://www.malwarebytes.com/legal/privacy-policy" id="cta-en-us-footernavigation-legal-_legal_privacy_policy-click">Privacy</a></li> <li id="menu-item-2940" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2940"><a href="https://www.malwarebytes.com/tos" id="cta-en-us-footernavigation-legal-_tos-click">Terms of Service</a></li> <li id="menu-item-2938" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2938"><a href="https://www.malwarebytes.com/accessibility" id="cta-en-us-footernavigation-legal-_accessibility-click">Accessibility</a></li> <li id="menu-item-116900" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-116900"><a href="https://www.malwarebytes.com/impressum">Imprint</a></li> </ul> <p class="site-footer__copyright"> © 2024 All Rights Reserved </p> </div> </div> </div> </div> </footer><!-- #colophon --> </div><!-- #page --> <script> var global_variables = { when: '7/3/2023 2:14:31 PM', site : { language: 'en', country: 'us', origin: 'https://www.malwarebytes.com', phoneNumbers: { 'US': {'view':'+1-800-520-2796','call':'18005202796'}, 'GB': {'view':'+44 (800) 368-8486','call':'448003688486'}, 'FR': {'view':'+33 (800) 909-009','call':'33800909009'}, 'ES': {'view':'+34 (900) 823-509','call':'34900823509'}, 'DE': {'view':'+49 (800) 723-4800','call':'498007234800'}, 'IT': {'view':'+39 (800) 972-511','call':'39800972511'}, 'SG': {'view':'+65 6813-2150','call':'6568132150'}, 'AU': {'view':'1800-745-824','call':'1800745824'}, 'NZ': {'view':'0800-446-541','call':'0800446541'} }, endpoints: { carts: { lira: 'https://ecom.malwarebytes.com', onepay: 'https://buy.malwarebytes.com', }, }, downloadLinks: { vpn: { mac: 'https://downloads.malwarebytes.com/file/mbprivacy-mac', windows: 'https://downloads.malwarebytes.com/file/mbprivacy-online', ios: 'https://apps.apple.com/us/app/malwarebytes-privacy-vpn/id1504101226', android: 'https://play.google.com/store/apps/details?id=org.malwarebytes.harpocrates' }, free: { mac: "https://www.malwarebytes.com/mac-download", windows: "https://www.malwarebytes.com/mwb-download/thankyou", ios: "https://apps.apple.com/US/app/id1327105431?mt=8", android: "https://play.google.com/store/apps/details?id=org.malwarebytes.antimalware", }, }, apiHostname: 'https://www-api.malwarebytes.com', //apiHostname: 'https://staging-www-api.malwarebytes.com', liraCartLinkEndpoint: 'https://ecom.malwarebytes.com' } } </script> <script> (function(){let request = new XMLHttpRequest(); let url = 'ht' + 'tps:' + '//' + 'api.weglot.com/' + 'pageviews?api_key=' + 'wg_ab7feeaf115f3476db3eec82a65b414c4'; let data = JSON.stringify({ url: location.protocol + '//' + location.host + location.pathname, language: document.getElementsByTagName('html')[0].getAttribute('lang'), browser_language: (navigator.language || navigator.userLanguage) } ); request.open('POST', url, true); request.send(data); })(); </script> <script>!function(t){"use strict";t.loadCSS||(t.loadCSS=function(){});var e=loadCSS.relpreload={};if(e.support=function(){var e;try{e=t.document.createElement("link").relList.supports("preload")}catch(t){e=!1}return function(){return e}}(),e.bindMediaToggle=function(t){function e(){t.media=a}var a=t.media||"all";t.addEventListener?t.addEventListener("load",e):t.attachEvent&&t.attachEvent("onload",e),setTimeout(function(){t.rel="stylesheet",t.media="only x"}),setTimeout(e,3e3)},e.poly=function(){if(!e.support())for(var a=t.document.getElementsByTagName("link"),n=0;n<a.length;n++){var o=a[n];"preload"!==o.rel||"style"!==o.getAttribute("as")||o.getAttribute("data-loadcss")||(o.setAttribute("data-loadcss",!0),e.bindMediaToggle(o))}},!e.support()){e.poly();var a=t.setInterval(e.poly,500);t.addEventListener?t.addEventListener("load",function(){e.poly(),t.clearInterval(a)}):t.attachEvent&&t.attachEvent("onload",function(){e.poly(),t.clearInterval(a)})}"undefined"!=typeof exports?exports.loadCSS=loadCSS:t.loadCSS=loadCSS}("undefined"!=typeof global?global:this);</script> <script type='text/javascript' id='rocket-browser-checker-js-after'>"use strict";var _createClass=function(){function defineProperties(target,props){for(var i=0;i<props.length;i++){var descriptor=props[i];descriptor.enumerable=descriptor.enumerable||!1,descriptor.configurable=!0,"value"in descriptor&&(descriptor.writable=!0),Object.defineProperty(target,descriptor.key,descriptor)}}return function(Constructor,protoProps,staticProps){return protoProps&&defineProperties(Constructor.prototype,protoProps),staticProps&&defineProperties(Constructor,staticProps),Constructor}}();function _classCallCheck(instance,Constructor){if(!(instance instanceof Constructor))throw new TypeError("Cannot call a class as a function")}var MdBrowserCompatibilityChecker=function(){function MdBrowserCompatibilityChecker(options){_classCallCheck(this,MdBrowserCompatibilityChecker),this.passiveSupported=!1,this._checkPassiveOption(this),this.options=!!this.passiveSupported&&options}return _createClass(MdBrowserCompatibilityChecker,[{key:"_checkPassiveOption",value:function(self){try{var options={get passive(){return!(self.passiveSupported=!0)}};window.addEventListener("test",null,options),window.removeEventListener("test",null,options)}catch(err){self.passiveSupported=!1}}},{key:"initRequestIdleCallback",value:function(){!1 in window&&(window.requestIdleCallback=function(cb){var start=Date.now();return setTimeout(function(){cb({didTimeout:!1,timeRemaining:function(){return Math.max(0,50-(Date.now()-start))}})},1)}),!1 in window&&(window.cancelIdleCallback=function(id){return clearTimeout(id)})}},{key:"isDataSaverModeOn",value:function(){return"connection"in navigator&&!0===navigator.connection.saveData}},{key:"supportsLinkPrefetch",value:function(){var elem=document.createElement("link");return elem.relList&&elem.relList.supports&&elem.relList.supports("prefetch")&&window.IntersectionObserver&&"isIntersecting"in IntersectionObserverEntry.prototype}},{key:"isSlowConnection",value:function(){return"connection"in navigator&&"effectiveType"in navigator.connection&&("2g"===navigator.connection.effectiveType||"slow-2g"===navigator.connection.effectiveType)}}]),MdBrowserCompatibilityChecker}();</script> <script type="text/javascript" id="rocket-delay-js-js-after">(function() {"use strict";var e=function(){function n(e,t){for(var r=0;r<t.length;r++){var n=t[r];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(e,n.key,n)}}return function(e,t,r){return t&&n(e.prototype,t),r&&n(e,r),e}}();function n(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}var t=function(){function r(e,t){n(this,r),this.attrName="data-mdlazyloadscript",this.browser=t,this.options=this.browser.options,this.triggerEvents=e,this.userEventListener=this.triggerListener.bind(this)}return e(r,[{key:"init",value:function(){this._addEventListener(this)}},{key:"reset",value:function(){this._removeEventListener(this)}},{key:"_addEventListener",value:function(t){this.triggerEvents.forEach(function(e){return window.addEventListener(e,t.userEventListener,t.options)})}},{key:"_removeEventListener",value:function(t){this.triggerEvents.forEach(function(e){return window.removeEventListener(e,t.userEventListener,t.options)})}},{key:"_loadScriptSrc",value:function(){var r=this,e=document.querySelectorAll("script["+this.attrName+"]");0!==e.length&&Array.prototype.slice.call(e).forEach(function(e){var t=e.getAttribute(r.attrName);e.setAttribute("src",t),e.removeAttribute(r.attrName)}),this.reset()}},{key:"triggerListener",value:function(){this._loadScriptSrc(),this._removeEventListener(this)}}],[{key:"run",value:function(){MdBrowserCompatibilityChecker&&new r(["keydown","mouseover","touchmove","touchstart"],new MdBrowserCompatibilityChecker({passive:!0})).init()}}]),r}();t.run();}());</script> <script> document.addEventListener("DOMContentLoaded",function(){let lazyFrames=document.querySelectorAll("iframe[data-src]");if("IntersectionObserver" in window){let lazyFrameObserver=new IntersectionObserver(function(entries,observer){entries.forEach(function(entry){if(entry.isIntersecting){let lazyFrame=entry.target;lazyFrame.src=lazyFrame.dataset.src;lazyFrameObserver.unobserve(lazyFrame)}})});lazyFrames.forEach(function(lazyFrame){lazyFrameObserver.observe(lazyFrame)})}else{lazyFrames.forEach(function(lazyFrame){lazyFrame.src=lazyFrame.dataset.src})}}) </script> <style id='malware-bytes-menu-links-style-inline-css'> .menu-links .menu-links__title,.menu-links h2{color:#0d3ecc;font-size:18px;line-height:26px;font-weight:500;margin-top:0;word-wrap:normal;word-break:normal}.menu-links .menu-links__title a,.menu-links h2 a{text-decoration:none}.menu-links .menu-links__subtitle,.menu-links h3{font-size:16px;line-height:20px;color:#082882;margin:0 0 10px;font-weight:500;letter-spacing:.2px}.menu-links ul{margin:0;padding:0;list-style-type:none}.menu-links ul li{font-weight:400;font-size:15.75px;color:#191919;margin:15px 0}.menu-links ul li img{vertical-align:middle;margin:0 3px}.menu-links ul li a{color:#191919}.menu-links ul li a:hover{color:#0d3ecc;font-weight:600;letter-spacing:-0.25px}.menu-links .menu-links__desc{margin:0 0 5px;font-size:15.25px;line-height:20px;color:#082882}.menu-links .menu-links__desc a{text-decoration:none}.menu-links .menu-links__desc img{vertical-align:middle;margin:0 3px}.menu-links.layout-2 .menu-links__desc a{font-weight:500}.menu-links .menu-links__cta a{padding-right:44px;color:#0d3ecc;font-weight:500;font-size:18px;transition:.25s ease-in-out;background:rgba(0,0,0,0) url(data:image/svg+xml;base64,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) right 6px center no-repeat;background-size:30px;font-family:"Graphik","Helvetica Neue","Helvetica","Arial",sans-serif;text-decoration:none}.menu-links .menu-links__cta a:hover{background-position:right 0 center}.menu-links.has-item-border .menu-links__item:not(:first-child){margin:10px 0 0;padding:10px 0 0;border-top:1px solid #d3d9e9}.menu-links.has-item-border .menu-links__item .menu-links__title+.menu-links__cta{margin-top:32px}.menu-links.layout-1.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-2.has-item-border .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-3 .menu-links__item:not(:first-child){margin:20px 0 0;padding:20px 0 0}.menu-links.layout-3.has-item-border .menu-links__item:not(:first-child){margin:25px 0 0;padding:25px 0 0}.menu-links.with-svg .menu-links__item{margin:20px 0 0;padding:20px 0 20px;border-top:1px solid #d3d9e9}.menu-links.with-svg .menu-links__desc a{font-weight:500}.menu-links.with-svg .menu-links__desc a svg{vertical-align:middle;margin:0 3px}@media (max-width: 1149px){.menu-links .menu-links__title,.menu-links h2{font-size:18px}} </style> <style id='wp-block-group-inline-css'> .wp-block-group{box-sizing:border-box} </style> <style id='wp-block-group-theme-inline-css'> :where(.wp-block-group.has-background){padding:1.25em 2.375em} </style> <style id='wp-block-columns-inline-css'> .wp-block-columns{align-items:normal!important;box-sizing:border-box;display:flex;flex-wrap:wrap!important}@media (min-width:782px){.wp-block-columns{flex-wrap:nowrap!important}}.wp-block-columns.are-vertically-aligned-top{align-items:flex-start}.wp-block-columns.are-vertically-aligned-center{align-items:center}.wp-block-columns.are-vertically-aligned-bottom{align-items:flex-end}@media (max-width:781px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:100%!important}}@media (min-width:782px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column[style*=flex-basis]{flex-grow:0}}.wp-block-columns.is-not-stacked-on-mobile{flex-wrap:nowrap!important}.wp-block-columns.is-not-stacked-on-mobile>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns.is-not-stacked-on-mobile>.wp-block-column[style*=flex-basis]{flex-grow:0}:where(.wp-block-columns){margin-bottom:1.75em}:where(.wp-block-columns.has-background){padding:1.25em 2.375em}.wp-block-column{flex-grow:1;min-width:0;overflow-wrap:break-word;word-break:break-word}.wp-block-column.is-vertically-aligned-top{align-self:flex-start}.wp-block-column.is-vertically-aligned-center{align-self:center}.wp-block-column.is-vertically-aligned-bottom{align-self:flex-end}.wp-block-column.is-vertically-aligned-stretch{align-self:stretch}.wp-block-column.is-vertically-aligned-bottom,.wp-block-column.is-vertically-aligned-center,.wp-block-column.is-vertically-aligned-top{width:100%} </style> <style id='global-styles-inline-css'> body{--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--blue: #0D3ECC;--wp--preset--color--navy-blue: #1C284C;--wp--preset--color--secondary-black: #191919;--wp--preset--color--dark-blue: #082882;--wp--preset--color--sky-blue: #009DEB;--wp--preset--color--baby-blue: #8DCFFD;--wp--preset--color--yellow: #EFC148;--wp--preset--color--pink: #E74488;--wp--preset--color--ruby: #A02A5C;--wp--preset--color--charcoal: #3D3D3D;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}body { margin: 0;--wp--style--global--content-size: 1200px;--wp--style--global--wide-size: 1200px; }.wp-site-blocks { padding-top: var(--wp--style--root--padding-top); padding-bottom: var(--wp--style--root--padding-bottom); }.has-global-padding { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding :where(.has-global-padding:not(.wp-block-block)) { padding-right: 0; padding-left: 0; }.has-global-padding > .alignfull { margin-right: calc(var(--wp--style--root--padding-right) * -1); margin-left: calc(var(--wp--style--root--padding-left) * -1); }.has-global-padding :where(.has-global-padding:not(.wp-block-block)) > .alignfull { margin-right: 0; margin-left: 0; }.has-global-padding > .alignfull:where(:not(.has-global-padding):not(.is-layout-flex):not(.is-layout-grid)) > :where([class*="wp-block-"]:not(.alignfull):not([class*="__"]),p,h1,h2,h3,h4,h5,h6,ul,ol) { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding :where(.has-global-padding) > .alignfull:where(:not(.has-global-padding)) > :where([class*="wp-block-"]:not(.alignfull):not([class*="__"]),p,h1,h2,h3,h4,h5,h6,ul,ol) { padding-right: 0; padding-left: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.wp-site-blocks) > * { margin-block-start: 24px; margin-block-end: 0; }:where(.wp-site-blocks) > :first-child:first-child { margin-block-start: 0; }:where(.wp-site-blocks) > :last-child:last-child { margin-block-end: 0; }body { --wp--style--block-gap: 24px; }:where(body .is-layout-flow) > :first-child:first-child{margin-block-start: 0;}:where(body .is-layout-flow) > :last-child:last-child{margin-block-end: 0;}:where(body .is-layout-flow) > *{margin-block-start: 24px;margin-block-end: 0;}:where(body .is-layout-constrained) > :first-child:first-child{margin-block-start: 0;}:where(body .is-layout-constrained) > :last-child:last-child{margin-block-end: 0;}:where(body .is-layout-constrained) > *{margin-block-start: 24px;margin-block-end: 0;}:where(body .is-layout-flex) {gap: 24px;}:where(body .is-layout-grid) {gap: 24px;}body .is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}body .is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}body .is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}body .is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}body .is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}body .is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}body .is-layout-flex{flex-wrap: wrap;align-items: center;}body .is-layout-flex > *{margin: 0;}body .is-layout-grid{display: grid;}body .is-layout-grid > *{margin: 0;}body{--wp--style--root--padding-top: 0px;--wp--style--root--padding-right: 0px;--wp--style--root--padding-bottom: 0px;--wp--style--root--padding-left: 0px;}a:where(:not(.wp-element-button)){text-decoration: underline;}.wp-element-button, .wp-block-button__link{background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-color{color: var(--wp--preset--color--blue) !important;}.has-navy-blue-color{color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-color{color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-color{color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-color{color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-color{color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-color{color: var(--wp--preset--color--yellow) !important;}.has-pink-color{color: var(--wp--preset--color--pink) !important;}.has-ruby-color{color: var(--wp--preset--color--ruby) !important;}.has-charcoal-color{color: var(--wp--preset--color--charcoal) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-background-color{background-color: var(--wp--preset--color--blue) !important;}.has-navy-blue-background-color{background-color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-background-color{background-color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-background-color{background-color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-background-color{background-color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-background-color{background-color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-background-color{background-color: var(--wp--preset--color--yellow) !important;}.has-pink-background-color{background-color: var(--wp--preset--color--pink) !important;}.has-ruby-background-color{background-color: var(--wp--preset--color--ruby) !important;}.has-charcoal-background-color{background-color: var(--wp--preset--color--charcoal) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-blue-border-color{border-color: var(--wp--preset--color--blue) !important;}.has-navy-blue-border-color{border-color: var(--wp--preset--color--navy-blue) !important;}.has-secondary-black-border-color{border-color: var(--wp--preset--color--secondary-black) !important;}.has-dark-blue-border-color{border-color: var(--wp--preset--color--dark-blue) !important;}.has-sky-blue-border-color{border-color: var(--wp--preset--color--sky-blue) !important;}.has-baby-blue-border-color{border-color: var(--wp--preset--color--baby-blue) !important;}.has-yellow-border-color{border-color: var(--wp--preset--color--yellow) !important;}.has-pink-border-color{border-color: var(--wp--preset--color--pink) !important;}.has-ruby-border-color{border-color: var(--wp--preset--color--ruby) !important;}.has-charcoal-border-color{border-color: var(--wp--preset--color--charcoal) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} .wp-block-pullquote{font-size: 1.5em;line-height: 1.6;} </style> <style id='core-block-supports-inline-css'> .wp-container-core-group-is-layout-1.wp-container-core-group-is-layout-1{flex-direction:column;align-items:stretch;}.wp-container-core-group-is-layout-2.wp-container-core-group-is-layout-2{flex-direction:column;align-items:stretch;}.wp-container-core-group-is-layout-3.wp-container-core-group-is-layout-3{flex-direction:column;align-items:stretch;}.wp-container-core-columns-is-layout-1.wp-container-core-columns-is-layout-1{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-2.wp-container-core-columns-is-layout-2{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-3.wp-container-core-columns-is-layout-3{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-4.wp-container-core-columns-is-layout-4{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-5.wp-container-core-columns-is-layout-5{flex-wrap:nowrap;}.wp-container-core-columns-is-layout-6.wp-container-core-columns-is-layout-6{flex-wrap:nowrap;} </style> <script src="https://www.malwarebytes.com/wp-includes/js/jquery/jquery.min.js?ver=1.0" id="jquery-js"></script> <script id="geot-js-js-extra"> var geot = {"ajax_url":"https:\/\/www.malwarebytes.com\/wp-admin\/admin-ajax.php","ajax":"","pid":"86834","is_archive":"","is_search":"","is_singular":"1","is_front_page":"","is_category":"","is_page":"1","is_single":"","disable_remove_on_singular":"1","is_builder":"","has_geo_posts":"1","dropdown_search":"","dropdown_redirect":"","elementor_popup":"1","hide_class":"","hide_override_class":"","remove_class":"","remove_override_class":"","disable_console":"","geoloc_enable":"by_ip","geoloc_force":"","geoloc_fail":"Geolocation is not supported by this browser","geot_cookies_duration":"999"}; </script> <script id="main-js-js-extra"> var siteConfig = {"ajaxUrl":"https:\/\/www.malwarebytes.com\/wp-admin\/admin-ajax.php","ajax_nonce":"2c2c40d49f","pwnedAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/aws\/have-i-been-pwned\/","eventAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/analytics\/event\/","newsletterAPI":"https:\/\/www.malwarebytes.com\/wp-json\/wp\/v2\/api\/iterable\/newsletter\/","newsletterSuccess":"https:\/\/www.malwarebytes.com\/en\/thank_you\/","newsletterError":"https:\/\/www.malwarebytes.com\/en\/newsletter_error\/","homeURL":"https:\/\/www.malwarebytes.com","request":"exploits"}; </script> <script type="text/javascript" src="https://www.malwarebytes.com/_static/??-eJyVjE0OAiEMRi/kTB0Tgy6MZwFssKR0yLSE6OklujHuXL7v50GvU1zFUAwqt0SikHA1vyU0ktQr1BaYIuSvYvpkc9Yd/CMoJKDIGI2eOA/6NdgdC46d5+43DA8b4FXRFEIjvo3mfbqWy+IObjmf9u6YX1l0Sdo=" defer></script><script defer src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/main-vwo-personalization-threatdown.js?ver=1.4" id="vwo-personalization-threatdown-js"></script> <script type="text/javascript" src="https://www.malwarebytes.com/_static/??-eJyVjlEOgkAMBS/k2hAk6ofxLGUpWNhtybZI9PRuvAGfL5mZPNjXEFWcxMFflMkgY9qxUP/xOtCM3MBKhNmAouZMJRJszomdKxFVF6bzbCc41FqpmAom/qKzSkXLQs4yhYh5RZ7EDkT7jdMAYyEKg+6SFIfDdqLRg+Cbp/+j6j/zo7m2zaXtuvtt/gEdGXHo" defer></script><script defer src="https://stats.wp.com/e-202447.js" id="jetpack-stats-js" data-wp-strategy="defer"></script> <script id="jetpack-stats-js-after"> _stq = window._stq || []; _stq.push([ "view", JSON.parse("{\"v\":\"ext\",\"blog\":\"227197325\",\"post\":\"86834\",\"tz\":\"-8\",\"srv\":\"www.malwarebytes.com\",\"hp\":\"vip\",\"j\":\"1:13.9.1\"}") ]); _stq.push([ "clickTrackerInit", "227197325", "86834" ]); </script> <script type="text/javascript" src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/build/blocks/hero-banner-v2/view.js?m=1726265692g" ></script> <script type="text/javascript" id="flying-scripts">const loadScriptsTimer = setTimeout(loadScripts,5* 1000 ) ;const userInteractionEvents = ["mouseover", "keydown", "touchstart", "touchmove", "wheel"]; userInteractionEvents.forEach(function (event) { window.addEventListener(event, triggerScriptLoader, {passive: !0}) }); function triggerScriptLoader() { loadScripts(); clearTimeout(loadScriptsTimer); userInteractionEvents.forEach(function (event) { window.removeEventListener(event, triggerScriptLoader, {passive: !0}) }) } function loadScripts() { document.querySelectorAll("script[data-type='lazy']").forEach(function (elem) { elem.setAttribute("src", elem.getAttribute("data-src")) }) }</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10