Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Generic BackDoor.c aliases:

Name Vendor Dr.Web classification name
Generic BackDoor.c McAfee Trojan.Proxy.146
Generic BackDoor.c McAfee Trojan.Proxy.25
Generic BackDoor.c McAfee DDoS.Attack.origin
Generic BackDoor.c McAfee Trojan.Proxy.403
Generic BackDoor.c McAfee Trojan.Proxy.377
Generic BackDoor.c McAfee Trojan.Click.278
Generic BackDoor.c McAfee Trojan.KeyLogger.203
Generic BackDoor.c McAfee BackDoor.NetContr.30
Generic BackDoor.c McAfee Trojan.PWS.Kyrgyz.27
Generic BackDoor.c McAfee BackDoor.IrcContact.20
Generic BackDoor.c McAfee BackDoor.Jacktron
Generic BackDoor.c McAfee BackDoor.IRC.Microji
Generic BackDoor.c McAfee BackDoor.Geek
Generic BackDoor.c McAfee BackDoor.Cupsy
Generic BackDoor.c McAfee Trojan.Jiospy
Generic BackDoor.c McAfee Trojan.Proxy.435
Generic BackDoor.c McAfee Trojan.Proxy.408
Generic BackDoor.c McAfee BackDoor.Gosbel
Generic BackDoor.c McAfee BackDoor.Matrix.30
Generic BackDoor.c McAfee BackDoor.SevenEleven
Generic BackDoor.c McAfee Trojan.Proxy.229
Generic BackDoor.c McAfee Trojan.DownLoader.4678
Generic BackDoor.c McAfee BackDoor.IRC.Transistor
Generic BackDoor.c McAfee BackDoor.Evils.1
Generic BackDoor.c McAfee BackDoor.Evils.11
Generic BackDoor.c McAfee BackDoor.Superman
Generic BackDoor.c McAfee Trojan.PWS.Fox
Generic BackDoor.c McAfee BackDoor.Chock
Generic BackDoor.c McAfee BackDoor.Leviat
Generic BackDoor.c McAfee BackDoor.Srvlite
Generic BackDoor.c McAfee Trojan.Click.302
Generic BackDoor.c McAfee BackDoor.Incred
Generic BackDoor.c McAfee Trojan.Proxy.316
Generic BackDoor.c McAfee Trojan.Popuper
Generic BackDoor.c McAfee Trojan.PWS.Legmir.411
Generic BackDoor.c McAfee Trojan.Proxy.489
Generic BackDoor.c McAfee Trojan.Proxy.462
Generic BackDoor.c McAfee Trojan.DownLoader.2491
Generic BackDoor.c McAfee BackDoor.Sms
Generic BackDoor.c McAfee DDoS.Attack.128
Generic BackDoor.c McAfee Trojan.CnIM
Generic BackDoor.c McAfee Trojan.Ports
Generic BackDoor.c McAfee BackDoor.Bybyte
Generic BackDoor.c McAfee Trojan.Proxy.702
Generic BackDoor.c McAfee Trojan.PWS.Zhui
Generic BackDoor.c McAfee Trojan.Proxy.660
Generic BackDoor.c McAfee DDoS.Attack.129
Generic BackDoor.c McAfee BackDoor.Krlua
Generic BackDoor.c McAfee BackDoor.Trover
Generic BackDoor.c McAfee BackDoor.Furax

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.