Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Banker.5456 18.10.2006 --- Show
Trojan.PWS.Banker.5457 18.10.2006 --- Show
Trojan.PWS.Banker.5459 18.10.2006 --- Show
Trojan.PWS.Banker.5460 18.10.2006 --- Show
Trojan.PWS.Banker.5461 18.10.2006 --- Show
Trojan.PWS.Banker.5462 18.10.2006 --- Show
Trojan.PWS.Banker.5463 18.10.2006 --- Show
Trojan.PWS.Banker.5464 18.10.2006 --- Show
Trojan.PWS.Banker.5465 18.10.2006 --- Show
Trojan.PWS.Banker.5466 18.10.2006 --- Show
Trojan.PWS.Banker.5467 18.10.2006 --- Show
Trojan.PWS.Banker.5468 18.10.2006 --- Show
Trojan.PWS.Banker.5469 18.10.2006 --- Show
Trojan.PWS.Banker.5470 18.10.2006 --- Show
Trojan.PWS.Banker.5471 18.10.2006 --- Show
Trojan.PWS.Banker.5474 18.10.2006 --- Show
Trojan.PWS.Centrix 18.10.2006 --- Show
Trojan.PWS.Dougou 18.10.2006 --- Show
Trojan.PWS.Hert 18.10.2006 --- Show
Trojan.PWS.LDPinch.1227 18.10.2006 --- Show
Trojan.PWS.LDPinch.1228 18.10.2006 --- Show
Trojan.PWS.LDPinch.1229 18.10.2006 --- Show
Trojan.PWS.LDPinch.1230 18.10.2006 --- Show
Trojan.PWS.LDPinch.1231 18.10.2006 --- Show
Trojan.PWS.LDPinch.1232 18.10.2006 --- Show
Trojan.PWS.LDPinch.1239 18.10.2006 --- Show
Trojan.PWS.LDPinch.1240 18.10.2006 --- Show
Trojan.PWS.LDPinch.1241 18.10.2006 --- Show
Trojan.PWS.Legmir.576 18.10.2006 --- Show
Trojan.PWS.Legmir.677 18.10.2006 --- Show
Trojan.PWS.Legmir.679 18.10.2006 --- Show
Trojan.PWS.Legmir.680 18.10.2006 --- Show
Trojan.PWS.Legmir.682 18.10.2006 --- Show
Trojan.PWS.Legmir.684 18.10.2006 --- Show
Trojan.PWS.Legmir.685 18.10.2006 --- Show
Trojan.PWS.Legmir.686 18.10.2006 --- Show
Trojan.PWS.Legmir.687 18.10.2006 --- Show
Trojan.PWS.Legmir.688 18.10.2006 --- Show
Trojan.PWS.Legmir.689 18.10.2006 --- Show
Trojan.PWS.Legmir.690 18.10.2006 --- Show
Trojan.PWS.Legmir.692 18.10.2006 --- Show
Trojan.PWS.Lele 18.10.2006 --- Show
Trojan.PWS.Qqpass.218 18.10.2006 --- Show
Trojan.PWS.Qqpass.222 18.10.2006 --- Show
Trojan.PWS.Qqpass.226 18.10.2006 --- Show
Trojan.PWS.Qqpass.227 18.10.2006 --- Show
Trojan.PWS.Qqpass.228 18.10.2006 --- Show
Trojan.PWS.Qqpass.230 18.10.2006 --- Show
Trojan.PWS.Qqpass.232 18.10.2006 --- Show
Trojan.PWS.Qqpass.233 18.10.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.