Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen32.11303 03:03:11 05.12.2025 Show
Trojan.PWS.Siggen4.12167 03:03:11 05.12.2025 Show
Trojan.MulDrop34.14119 03:03:11 05.12.2025 Show
Trojan.MulDrop34.14032 03:03:11 05.12.2025 Show
Trojan.Inject6.18277 03:03:10 05.12.2025 Show
Trojan.MulDrop34.14213 03:03:10 05.12.2025 Show
Trojan.MulDrop34.15300 03:03:10 05.12.2025 Show
Trojan.PWS.Siggen4.11695 03:03:10 05.12.2025 Show
Trojan.MulDrop34.15441 03:03:10 05.12.2025 Show
Trojan.MulDrop34.14262 03:03:10 05.12.2025 Show
Trojan.PWS.Siggen4.11567 03:03:10 05.12.2025 Show
Trojan.KillFiles2.4960 03:03:10 05.12.2025 Show
Trojan.MulDrop34.13879 03:03:10 05.12.2025 Show
Trojan.Siggen32.11351 03:03:09 05.12.2025 Show
Trojan.MulDrop34.14470 03:03:09 05.12.2025 Show
Trojan.Siggen32.11272 03:03:09 05.12.2025 Show
Trojan.PWS.Siggen4.12337 03:03:09 05.12.2025 Show
Trojan.PWS.Siggen4.11803 03:03:09 05.12.2025 Show
Trojan.PWS.Siggen4.11339 03:03:09 05.12.2025 Show
Trojan.Encoder.43806 03:03:09 05.12.2025 Show
Trojan.KillFiles2.4951 03:03:09 05.12.2025 Show
Trojan.PWS.Siggen4.11889 03:03:09 05.12.2025 Show
Trojan.MulDrop34.14625 03:03:09 05.12.2025 Show
Trojan.PWS.Siggen4.11788 03:03:08 05.12.2025 Show
Trojan.Siggen32.11372 03:03:08 05.12.2025 Show
Trojan.Siggen32.11283 03:03:08 05.12.2025 Show
Trojan.Siggen32.11310 03:03:08 05.12.2025 Show
Trojan.MulDrop34.14437 03:03:08 05.12.2025 Show
Trojan.Siggen32.11396 03:03:08 05.12.2025 Show
Trojan.PWS.Siggen4.13199 03:03:08 05.12.2025 Show
Trojan.Siggen32.11238 03:03:08 05.12.2025 Show
Trojan.PWS.Siggen4.12454 03:03:08 05.12.2025 Show
Trojan.KillFiles2.4965 03:03:08 05.12.2025 Show
Trojan.MulDrop34.14454 03:03:08 05.12.2025 Show
Trojan.PWS.Siggen4.11586 03:03:07 05.12.2025 Show
Trojan.MulDrop34.14067 03:03:07 05.12.2025 Show
Trojan.PWS.Siggen4.11247 03:03:07 05.12.2025 Show
Trojan.PWS.Siggen4.12215 03:03:07 05.12.2025 Show
Trojan.PWS.Siggen4.12532 03:03:07 05.12.2025 Show
Trojan.PWS.Siggen4.12433 03:03:06 05.12.2025 Show
Trojan.PWS.Siggen4.12588 03:03:06 05.12.2025 Show
Trojan.StartPage1.64736 03:03:06 05.12.2025 Show
Trojan.PWS.Siggen4.11878 03:03:06 05.12.2025 Show
Trojan.PWS.Siggen4.11577 03:03:06 05.12.2025 Show
Trojan.DownLoader49.16757 03:03:06 05.12.2025 Show
Trojan.PWS.Siggen4.11312 03:03:06 05.12.2025 Show
Trojan.MulDrop34.15108 03:03:05 05.12.2025 Show
Trojan.DownLoader49.16823 03:03:05 05.12.2025 Show
Trojan.MulDrop34.14065 03:03:05 05.12.2025 Show
Trojan.MulDrop34.14316 03:03:05 05.12.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.