Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader18.28791 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28765 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28869 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28820 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28789 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28868 28.12.2015 28.12.2015 Show
Trojan.Inject2.11676 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28849 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28872 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28932 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28867 28.12.2015 28.12.2015 Show
BackDoor.Siggen2.146 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28859 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28761 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28862 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28863 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28736 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28802 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28732 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28855 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28738 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28778 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28699 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28668 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28649 28.12.2015 28.12.2015 Show
Trojan.Inject2.11663 28.12.2015 28.12.2015 Show
Trojan.Matsnu.134 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28679 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28683 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28681 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28694 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28674 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28544 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28687 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28470 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28424 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28497 28.12.2015 28.12.2015 Show
Trojan.KillFiles.57837 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28435 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28387 28.12.2015 27.12.2015 Show
Trojan.DownLoader18.28433 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28410 28.12.2015 27.12.2015 Show
Trojan.DownLoader18.28334 28.12.2015 27.12.2015 Show
Trojan.Upatre.10162 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28440 28.12.2015 28.12.2015 Show
Trojan.DownLoader18.28342 28.12.2015 27.12.2015 Show
Trojan.DownLoader18.28381 28.12.2015 27.12.2015 Show
Trojan.DownLoader18.28368 28.12.2015 27.12.2015 Show
Trojan.DownLoader18.28380 28.12.2015 27.12.2015 Show
Trojan.MulDrop6.18408 28.12.2015 27.12.2015 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.