Malwarebytes (formerly Malwarebytes Anti-Malware, abbreviated as MBAM) is an
anti-malware software for
Microsoft Windows,
macOS
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac (computer), Mac computers. Within the market of ...
,
ChromeOS
ChromeOS, sometimes stylized as chromeOS and formerly styled as Chrome OS, is a Linux-based operating system designed by Google. It is derived from the open-source ChromiumOS and uses the Google Chrome web browser as its principal user interfac ...
,
Android, and
iOS
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
that finds and removes
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
.
Made by
Malwarebytes Corporation, it was first released in January 2006. It is available in a free version, which scans for and removes malware when started manually, and a paid version, which additionally provides scheduled scans, real-time protection and a flash-memory scanner.
Overview
Malwarebytes is primarily a scanner that scans and removes malicious software, including
rogue security software
Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on ...
,
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
, and
spyware
Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
. Malwarebytes scans in
batch mode
Computerized batch processing is a method of running software programs called jobs in batches automatically. While users are required to submit the jobs, no other interaction by the user is required to process the batch. Batches may automatically ...
, rather than scanning all files opened, reducing interference if another on-demand anti-malware software is also running on the computer.
Malwarebytes is available in both a free and a paid version.
The free version can be run manually by the user when desired, whereas the paid version can perform scheduled scans, automatically scan files when opened, block
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es of malicious web sites, and scan only those
services, programs and
device driver
In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and o ...
s that are currently in use.
Security vulnerabilities
On February 2, 2016,
Project Zero discovered four vulnerabilities in the Malwarebytes flagship product, including lack of server-side encryption for update files and lack of proper payload signing within encrypted data; the combination of which allowed an attacker to recompile the encrypted payload with exploits. Malwarebytes responded one day before disclosure in a blog article detailing the extreme difficulty in executing these attacks, as well as revealing that the announced server-side and encryption issues were resolved within days of private disclosure and were not outstanding at the time Project Zero published their research. Malwarebytes also published information on how to protect current users until a patch was released. This event also resulted in the establishment of a formal
bug bounty program
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabiliti ...
by Malwarebytes, which offers up to $1000 per disclosure , depending on severity and exploitability.
Dispute with IObit
On November 2, 2009, Malwarebytes accused IObit, a Chinese company that offers similar products, of incorporating the database of Malwarebytes Anti-Malware (and several products from other vendors, which were not named) into its security software IObit Security 360.
IObit denied the accusation and stated that the database is based on user submissions, and sometimes the same signature names that are in Malwarebytes get placed into the results. They said that they did not have time to filter out the signature names that are similar to Malwarebytes. IObit also stated that Malwarebytes did not have convincing proof, and declared that the databases were not stolen. After the declaration from IObit, Malwarebytes replied that they are not convinced of the argument from IObit. Malwarebytes claims to have served
DMCA
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
infringement notices against CNET,
Download.com and Majorgeeks in order to have the download sites remove the IObit software. IObit said that as of version 1.3, their database has been updated to address those accusations of intellectual property theft made earlier by Malwarebytes.
See also
*
Comparison of computer viruses
The compilation of a unified list of computer viruses is made difficult because of naming. To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software ...
*
Internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
References
External links
*
{{Antivirus software
Antivirus software
Spyware removal
Android (operating system) software
Shareware
Windows security software
Software that uses Qt
Proprietary software that uses Qt
Security software
MacOS security software