Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.Prone 16.02.2006 --- Show
Trojan.DownLoader.6612 16.02.2006 --- Show
BackDoor.IRC.Sdbot.350 16.02.2006 --- Show
BackDoor.Generic.1170 16.02.2006 --- Show
Trojan.DownLoader.6346 16.02.2006 --- Show
Trojan.DownLoader.6575 16.02.2006 --- Show
Trojan.PWS.Banker.1264 16.02.2006 --- Show
VBS.Generic.474 16.02.2006 --- Show
Win32.HLLM.Winfo 16.02.2006 --- Show
Trojan.DownLoader.6589 16.02.2006 --- Show
Trojan.Proxy.630 16.02.2006 --- Show
Trojan.PWS.Banker.1483 16.02.2006 --- Show
BackDoor.Pigeon.90 16.02.2006 --- Show
Trojan.PWS.LDPinch.708 16.02.2006 --- Show
Trojan.PWS.Legmir.392 16.02.2006 --- Show
Trojan.Isbar.406 16.02.2006 --- Show
BackDoor.IRC.Better 16.02.2006 --- Show
BackDoor.IRC.Sdbot.438 16.02.2006 --- Show
Trojan.PWS.Banker.1485 16.02.2006 --- Show
Trojan.PWS.Banker.1440 16.02.2006 --- Show
Trojan.Click.877 16.02.2006 --- Show
Trojan.Proxy.671 16.02.2006 --- Show
BackDoor.Psa 16.02.2006 --- Show
Trojan.PWS.LDPinch.699 16.02.2006 --- Show
BackDoor.R3C.147 16.02.2006 --- Show
Trojan.DownLoader.5174 16.02.2006 --- Show
BackDoor.Pigeon.117 16.02.2006 --- Show
Trojan.DownLoader.6494 16.02.2006 --- Show
Trojan.MulDrop.3250 16.02.2006 --- Show
Trojan.DownLoader.6210 16.02.2006 --- Show
Trojan.MulDrop.3221 16.02.2006 --- Show
Trojan.DownLoader.6583 16.02.2006 --- Show
Trojan.DownLoader.6379 16.02.2006 --- Show
Trojan.MulDrop.3232 16.02.2006 --- Show
Trojan.DownLoader.6323 16.02.2006 --- Show
BackDoor.IRC.Necrose 16.02.2006 --- Show
Trojan.PWS.LDPinch.694 16.02.2006 --- Show
Trojan.DownLoader.4821 16.02.2006 --- Show
Trojan.MulDrop.3242 16.02.2006 --- Show
BackDoor.Braza 16.02.2006 --- Show
Trojan.MulDrop.3219 16.02.2006 --- Show
Trojan.Inject.47 16.02.2006 --- Show
Trojan.PWS.LDPinch.711 16.02.2006 --- Show
BackDoor.Lay 16.02.2006 --- Show
BackDoor.ProRat.44 16.02.2006 --- Show
Trojan.DownLoader.6585 16.02.2006 --- Show
Trojan.Click.866 16.02.2006 --- Show
BackDoor.Bifrost.28 16.02.2006 --- Show
Trojan.PWS.Banker.1482 16.02.2006 --- Show
Trojan.DownLoader.6601 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.