Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Encoder.3251 11.12.2015 11.12.2015 Show
BackDoor.Gootkit.185 11.12.2015 11.12.2015 Show
Trojan.Encoder.3253 11.12.2015 11.12.2015 Show
Trojan.MulDrop6.17047 11.12.2015 11.12.2015 Show
Trojan.PWS.Siggen1.44798 11.12.2015 11.12.2015 Show
Trojan.PWS.Papras.1763 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7641 11.12.2015 11.12.2015 Show
Trojan.Encoder.3244 11.12.2015 11.12.2015 Show
Trojan.Encoder.3249 11.12.2015 11.12.2015 Show
Trojan.Encoder.3246 11.12.2015 11.12.2015 Show
Trojan.KillProc.36870 11.12.2015 11.12.2015 Show
Trojan.Encoder.3245 11.12.2015 11.12.2015 Show
Trojan.Inject2.10276 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7529 11.12.2015 11.12.2015 Show
Trojan.Click3.16784 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7506 11.12.2015 11.12.2015 Show
Trojan.PWS.Stealer.16630 11.12.2015 11.12.2015 Show
Trojan.Siggen6.53936 11.12.2015 11.12.2015 Show
Trojan.Siggen6.53933 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7456 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7445 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7444 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7458 11.12.2015 11.12.2015 Show
Win32.HLLW.SpyNet.359 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7441 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7433 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7451 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7452 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7450 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7431 11.12.2015 11.12.2015 Show
Trojan.Encoder.3233 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7422 11.12.2015 11.12.2015 Show
Trojan.PWS.Siggen1.44783 11.12.2015 11.12.2015 Show
Trojan.Fakealert.52071 11.12.2015 11.12.2015 Show
Trojan.Encoder.3231 11.12.2015 11.12.2015 Show
Trojan.FakeAV.18536 11.12.2015 11.12.2015 Show
Trojan.Encoder.3232 11.12.2015 11.12.2015 Show
Trojan.RKDoor.10580 11.12.2015 11.12.2015 Show
Trojan.Encoder.3229 11.12.2015 11.12.2015 Show
Trojan.Inject2.10250 11.12.2015 11.12.2015 Show
Trojan.Encoder.3228 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7403 11.12.2015 11.12.2015 Show
Trojan.Encoder.3230 11.12.2015 11.12.2015 Show
Trojan.Inject2.10244 11.12.2015 11.12.2015 Show
Trojan.Inject2.10239 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7371 11.12.2015 11.12.2015 Show
Trojan.DownLoader18.7319 11.12.2015 10.12.2015 Show
Trojan.DownLoader18.7304 11.12.2015 10.12.2015 Show
Trojan.DownLoader18.7300 11.12.2015 10.12.2015 Show
Trojan.DownLoader18.7303 11.12.2015 10.12.2015 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.