Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Siggen9.45910 14.05.2020 14.05.2020 Show
Exploit.Siggen.64267 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19169 14.05.2020 14.05.2020 Show
Trojan.Carberp.1983 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19799 14.05.2020 14.05.2020 Show
Trojan.PWS.Siggen2.48734 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40760 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40818 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19448 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19369 14.05.2020 14.05.2020 Show
Exploit.Siggen.64365 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19776 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19313 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19132 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40870 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19699 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19334 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19139 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19592 14.05.2020 14.05.2020 Show
Exploit.Siggen.64248 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19320 14.05.2020 14.05.2020 Show
Exploit.Siggen.64270 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45803 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19192 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19400 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19500 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40833 14.05.2020 14.05.2020 Show
Trojan.PWS.Siggen2.48697 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19575 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19129 14.05.2020 14.05.2020 Show
Exploit.Siggen.64363 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19873 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19782 14.05.2020 14.05.2020 Show
Trojan.PWS.Siggen2.48733 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19361 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19827 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40869 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19367 14.05.2020 14.05.2020 Show
Exploit.Siggen.64302 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19935 14.05.2020 14.05.2020 Show
Trojan.DownLoader7.62323 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19576 14.05.2020 14.05.2020 Show
Trojan.PWS.Siggen2.48718 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19363 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19898 14.05.2020 14.05.2020 Show
Exploit.Siggen.64327 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19385 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40923 14.05.2020 14.05.2020 Show
Exploit.Siggen.64311 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19612 14.05.2020 14.05.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.