Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Spy.6613 06:34:34 08.09.2024 Show
Android.Click.1788 06:34:28 08.09.2024 Show
Adware.Gexin.23595 06:34:21 08.09.2024 Show
Android.Click.1787 06:34:14 08.09.2024 Show
Adware.Iflytek.72 06:34:10 08.09.2024 Show
Android.Mobifun.327 06:34:03 08.09.2024 Show
Linux.Siggen.8058 06:00:02 07.09.2024 Show
Android.Spy.6612 05:20:54 08.09.2024 Show
Trojan.MulDrop28.17118 03:01:36 08.09.2024 Show
Trojan.Siggen29.36242 03:01:36 08.09.2024 Show
Trojan.DownLoader47.35792 03:01:36 08.09.2024 Show
Trojan.MulDrop28.17114 03:01:36 08.09.2024 Show
Trojan.DownLoader47.35961 03:01:36 08.09.2024 Show
Trojan.Siggen29.35978 03:01:36 08.09.2024 Show
Trojan.MulDrop28.16840 03:01:36 08.09.2024 Show
Trojan.Inject5.8612 03:01:36 08.09.2024 Show
Trojan.Inject5.8605 03:01:36 08.09.2024 Show
Trojan.MulDrop28.16927 03:01:35 08.09.2024 Show
Trojan.Siggen29.36212 03:01:35 08.09.2024 Show
Trojan.MulDrop28.16873 03:01:35 08.09.2024 Show
Trojan.Inject5.8582 03:01:35 08.09.2024 Show
Trojan.MulDrop28.17175 03:01:35 08.09.2024 Show
Trojan.DownLoader47.35847 03:01:35 08.09.2024 Show
Trojan.Siggen29.36044 03:01:35 08.09.2024 Show
Trojan.PWS.Siggen3.38290 03:01:35 08.09.2024 Show
Trojan.MulDrop28.16905 03:01:35 08.09.2024 Show
Trojan.MulDrop28.17074 03:01:35 08.09.2024 Show
Trojan.MulDrop28.16884 03:01:35 08.09.2024 Show
Trojan.DownLoader47.35727 03:01:35 08.09.2024 Show
Trojan.DownLoader47.35827 03:01:35 08.09.2024 Show
Trojan.Siggen29.35952 03:01:35 08.09.2024 Show
Trojan.Siggen29.36014 03:01:35 08.09.2024 Show
Trojan.Siggen29.36033 03:01:35 08.09.2024 Show
Trojan.Hosts.52045 03:01:35 08.09.2024 Show
Trojan.MulDrop28.17082 03:01:34 08.09.2024 Show
Trojan.Siggen29.36243 03:01:34 08.09.2024 Show
Trojan.Siggen29.35964 03:01:34 08.09.2024 Show
Trojan.DownLoader47.35680 03:01:34 08.09.2024 Show
Trojan.KillProc2.23610 03:01:34 08.09.2024 Show
Trojan.Siggen29.36256 03:01:34 08.09.2024 Show
Trojan.DownLoader47.35912 03:01:34 08.09.2024 Show
Trojan.Siggen29.36223 03:01:34 08.09.2024 Show
Trojan.DownLoader47.35686 03:01:34 08.09.2024 Show
Trojan.DownLoader47.35970 03:01:34 08.09.2024 Show
Trojan.Siggen29.36145 03:01:34 08.09.2024 Show
Trojan.DownLoader47.35751 03:01:34 08.09.2024 Show
Trojan.Siggen29.35959 03:01:33 08.09.2024 Show
Trojan.MulDrop28.17185 03:01:33 08.09.2024 Show
Trojan.DownLoader47.35756 03:01:33 08.09.2024 Show
Trojan.DownLoader47.35967 03:01:33 08.09.2024 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.