Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Exploit.MS04-032 17.02.2006 --- Show
Exploit.MS05-51 17.02.2006 --- Show
Exploit.MSNTrill 17.02.2006 --- Show
Exploit.MyDoom.4 17.02.2006 --- Show
Exploit.Nextgenss 17.02.2006 --- Show
Exploit.Umex 17.02.2006 --- Show
FDOS.BombSquad 17.02.2006 --- Show
FDOS.Hitman 17.02.2006 --- Show
FDOS.Postin 17.02.2006 --- Show
FDOS.Zmail 17.02.2006 --- Show
Fict.1654 17.02.2006 --- Show
Flooder.Bobo 17.02.2006 --- Show
Flooder.Dnf.10 17.02.2006 --- Show
Flooder.MicroDot 17.02.2006 --- Show
Flooder.School 17.02.2006 --- Show
Frizer.1026 17.02.2006 --- Show
HLLM.Youdgos 17.02.2006 --- Show
HLLO.Wiseman.4868 17.02.2006 --- Show
HLLP.Viper.7792 17.02.2006 --- Show
HLLP.Xenia.5809 17.02.2006 --- Show
HLLP.Xenia.5844 17.02.2006 --- Show
HLLW.Overnuke 17.02.2006 --- Show
HLLW.Petik.36812 17.02.2006 --- Show
HLLW.Splitter 17.02.2006 --- Show
HLLW.Tossed.29824 17.02.2006 --- Show
HLLW.Yoyk.9888 17.02.2006 --- Show
HLP.Lucky 17.02.2006 --- Show
HLP.Pluma 17.02.2006 --- Show
HLP.Ussu 17.02.2006 --- Show
IoSys.1024 17.02.2006 --- Show
IRC.Mooshow 17.02.2006 --- Show
IRC.Owned 17.02.2006 --- Show
IRC.Pory 17.02.2006 --- Show
IRC.Sinister 17.02.2006 --- Show
IRC.SpyBoy 17.02.2006 --- Show
IRC.Wankish 17.02.2006 --- Show
IRC.Zaoyb 17.02.2006 --- Show
Iwag.4183 17.02.2006 --- Show
Jam.1295 17.02.2006 --- Show
JB.2351 17.02.2006 --- Show
JB.2413 17.02.2006 --- Show
JB.dropper.2413 17.02.2006 --- Show
Jerbi.Generator 17.02.2006 --- Show
Keypress.1003 17.02.2006 --- Show
Kvs.836 17.02.2006 --- Show
Lapiddan.based 17.02.2006 --- Show
Legmir.Generator 17.02.2006 --- Show
Linc.196 17.02.2006 --- Show
Marzia.VDS 17.02.2006 --- Show
Marzia.WW 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web to rosyjski producent oprogramowania antywirusowego Dr.Web. Rozwijamy nasze produkty od 1992 roku.