Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop12.19114 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19278 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19900 14.05.2020 14.05.2020 Show
Trojan.Inject3.39887 14.05.2020 14.05.2020 Show
Trojan.Inject3.39893 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45858 14.05.2020 14.05.2020 Show
Exploit.Siggen.64280 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40686 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19626 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19853 14.05.2020 14.05.2020 Show
Exploit.Siggen.64369 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45773 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19957 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45912 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19729 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40795 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19442 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19254 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19423 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19684 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19665 14.05.2020 14.05.2020 Show
Exploit.Siggen.64351 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40798 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19236 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40888 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45819 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40830 14.05.2020 14.05.2020 Show
Exploit.Siggen.64269 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19447 14.05.2020 14.05.2020 Show
Exploit.Siggen.64345 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19577 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19223 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19388 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19218 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40909 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45894 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45743 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19065 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40749 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19138 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40791 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19212 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19658 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19675 14.05.2020 14.05.2020 Show
Exploit.Siggen.64341 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19397 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19831 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19828 14.05.2020 14.05.2020 Show
Trojan.DownLoader16.12209 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19060 14.05.2020 14.05.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.