Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.6312 16.02.2006 --- Show
Trojan.MulDrop.3235 16.02.2006 --- Show
Trojan.DownLoader.6292 16.02.2006 --- Show
Trojan.DownLoader.6570 16.02.2006 --- Show
Trojan.Proxy.648 16.02.2006 --- Show
Trojan.DownLoader.6395 16.02.2006 --- Show
BackDoor.Wzx 16.02.2006 --- Show
BackDoor.Generic.1100 16.02.2006 --- Show
BackDoor.Sunshadow.13 16.02.2006 --- Show
BackDoor.Confi 16.02.2006 --- Show
BackDoor.IRC.Frux 16.02.2006 --- Show
Trojan.AVKill.137 16.02.2006 --- Show
BackDoor.Iroffer.1237 16.02.2006 --- Show
Trojan.DownLoader.6438 16.02.2006 --- Show
Trojan.PWS.Banker.1490 16.02.2006 --- Show
BackDoor.Voch 16.02.2006 --- Show
BackDoor.Awr 16.02.2006 --- Show
Trojan.StartPage.554 16.02.2006 --- Show
BackDoor.Pigeon.69 16.02.2006 --- Show
BackDoor.Cedrich 16.02.2006 --- Show
Trojan.StartPage.1216 16.02.2006 --- Show
BackDoor.IRC.Sdbot.307 16.02.2006 --- Show
Trojan.DownLoader.6527 16.02.2006 --- Show
Trojan.DownLoader.6449 16.02.2006 --- Show
BackDoor.IRC.Krikstas 16.02.2006 --- Show
Trojan.KeyLogger.368 16.02.2006 --- Show
Trojan.DownLoader.6512 16.02.2006 --- Show
BackDoor.Onwave 16.02.2006 --- Show
BackDoor.Irrofer.1402 16.02.2006 --- Show
Trojan.DownLoader.6250 16.02.2006 --- Show
Trojan.Click.849 16.02.2006 --- Show
Trojan.DownLoader.6481 16.02.2006 --- Show
Trojan.MulDrop.2659 16.02.2006 --- Show
BackDoor.Releri 16.02.2006 --- Show
Trojan.DownLoader.6616 16.02.2006 --- Show
BackDoor.Bigmonster 16.02.2006 --- Show
Trojan.PWS.Legmir.471 16.02.2006 --- Show
Trojan.PWS.LDPinch.712 16.02.2006 --- Show
Win32.HLLO.Enternity.55808 16.02.2006 --- Show
Tool.BlackWin 16.02.2006 --- Show
Trojan.DownLoader.6586 16.02.2006 --- Show
Trojan.MulDrop.3245 16.02.2006 --- Show
Trojan.DownLoader.6380 16.02.2006 --- Show
BackDoor.Pigeon.42 16.02.2006 --- Show
Trojan.Apsara 16.02.2006 --- Show
Trojan.DownLoader.6578 16.02.2006 --- Show
Trojan.Proxy.661 16.02.2006 --- Show
Trojan.PWS.Banker.1477 16.02.2006 --- Show
BackDoor.Radmin.32 16.02.2006 --- Show
BackDoor.Pigeon.37 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.