Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop28.47787 03:01:16 04.12.2024 Show
Trojan.Siggen30.15766 03:01:15 04.12.2024 Show
Trojan.Siggen30.15714 03:01:15 04.12.2024 Show
Trojan.MulDrop28.47744 03:01:15 04.12.2024 Show
Trojan.DownLoader47.55498 03:01:15 04.12.2024 Show
Trojan.Siggen30.15680 03:01:15 04.12.2024 Show
Trojan.Siggen30.15793 03:01:15 04.12.2024 Show
Trojan.DownLoader47.55411 03:01:15 04.12.2024 Show
Trojan.Siggen30.15867 03:01:15 04.12.2024 Show
Trojan.MulDrop28.47852 03:01:14 04.12.2024 Show
Trojan.Inject5.12914 03:01:14 04.12.2024 Show
Trojan.Siggen30.16137 03:01:14 04.12.2024 Show
Trojan.DownLoader47.55480 03:01:14 04.12.2024 Show
Trojan.Siggen30.15845 03:01:14 04.12.2024 Show
Trojan.Siggen30.15928 03:01:14 04.12.2024 Show
Trojan.MulDrop28.47793 03:01:14 04.12.2024 Show
Trojan.PWS.Spy.19868 03:01:13 04.12.2024 Show
Trojan.Siggen30.15663 03:01:13 04.12.2024 Show
Trojan.Siggen30.16815 03:01:13 04.12.2024 Show
Trojan.Siggen30.16062 03:01:13 04.12.2024 Show
Trojan.Siggen30.16151 03:01:13 04.12.2024 Show
Trojan.Siggen30.15923 03:01:13 04.12.2024 Show
Trojan.Siggen30.15700 03:01:13 04.12.2024 Show
Trojan.DownLoader47.55443 03:01:13 04.12.2024 Show
Trojan.DownLoader47.55500 03:01:13 04.12.2024 Show
Trojan.Siggen30.15780 03:01:13 04.12.2024 Show
Trojan.DownLoader47.55465 03:01:12 04.12.2024 Show
Trojan.Siggen30.15770 03:01:12 04.12.2024 Show
Trojan.DownLoader47.55595 03:01:12 04.12.2024 Show
Trojan.DownLoader47.55567 03:01:12 04.12.2024 Show
Trojan.MulDrop28.47725 03:01:12 04.12.2024 Show
Trojan.DownLoader47.55545 03:01:12 04.12.2024 Show
Trojan.MulDrop28.47871 03:01:12 04.12.2024 Show
Trojan.Siggen30.15900 03:01:12 04.12.2024 Show
Trojan.MulDrop28.47887 03:01:12 04.12.2024 Show
Trojan.Siggen30.16747 03:01:11 04.12.2024 Show
Trojan.Siggen30.15675 03:01:10 04.12.2024 Show
Trojan.MulDrop28.47792 03:01:10 04.12.2024 Show
Trojan.Siggen30.16038 03:01:09 04.12.2024 Show
Trojan.Siggen30.15800 03:01:09 04.12.2024 Show
Trojan.Siggen30.15828 03:01:09 04.12.2024 Show
Trojan.FBNG.226 03:01:09 04.12.2024 Show
Trojan.Siggen30.16013 03:01:09 04.12.2024 Show
Trojan.Siggen30.15823 03:01:08 04.12.2024 Show
Trojan.Siggen30.15709 03:01:08 04.12.2024 Show
Trojan.Siggen30.16060 03:01:08 04.12.2024 Show
Trojan.Siggen30.16160 03:01:08 04.12.2024 Show
Trojan.PWS.Siggen3.39147 03:01:08 04.12.2024 Show
Trojan.Siggen30.15804 03:01:08 04.12.2024 Show
Trojan.MulDrop28.47753 03:01:08 04.12.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.