Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop12.19397 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19831 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19828 14.05.2020 14.05.2020 Show
Trojan.DownLoader16.12209 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19060 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19756 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19518 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19807 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19228 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19619 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40876 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40793 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45843 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19923 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19632 14.05.2020 14.05.2020 Show
Trojan.Siggen9.44561 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19742 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19294 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40719 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19924 14.05.2020 14.05.2020 Show
Trojan.PWS.Siggen2.48744 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19411 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40867 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19467 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40872 14.05.2020 14.05.2020 Show
Exploit.Siggen.64284 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19915 14.05.2020 14.05.2020 Show
Exploit.Siggen.64380 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19542 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40829 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19477 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19075 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19167 14.05.2020 14.05.2020 Show
Exploit.Siggen.64352 14.05.2020 14.05.2020 Show
Exploit.Siggen.64298 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19605 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19874 14.05.2020 14.05.2020 Show
Trojan.Siggen9.45759 14.05.2020 14.05.2020 Show
Trojan.KillProc2.10406 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19335 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40750 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19737 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19296 14.05.2020 14.05.2020 Show
Exploit.Siggen.64271 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19509 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19360 14.05.2020 14.05.2020 Show
Trojan.DownLoader33.40807 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19844 14.05.2020 14.05.2020 Show
Exploit.Siggen.64287 14.05.2020 14.05.2020 Show
Trojan.MulDrop12.19461 14.05.2020 14.05.2020 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.