Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader4.18669 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18670 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18671 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18672 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18673 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18674 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18675 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18676 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18677 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18678 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18679 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18680 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18681 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18682 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18683 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18684 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18685 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18686 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18687 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18688 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18689 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18690 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18691 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18692 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18693 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18694 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18695 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18696 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18697 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18699 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18700 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18701 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18702 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18703 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18704 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18705 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18706 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18707 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18708 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18709 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18710 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18711 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18713 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18714 21.07.2011 20.07.2011 Show
Trojan.DownLoader4.18715 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18716 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18717 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18718 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18719 21.07.2011 21.07.2011 Show
Trojan.DownLoader4.18720 21.07.2011 21.07.2011 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.