Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Isbar.367 16.02.2006 --- Show
Adware.Redhotnet 16.02.2006 --- Show
Trojan.DownLoader.5987 16.02.2006 --- Show
Adware.Netrover 16.02.2006 --- Show
Adware.Cardmux 16.02.2006 --- Show
Adware.Mit 16.02.2006 --- Show
Trojan.MulDrop.3040 16.02.2006 --- Show
Trojan.MulDrop.2923 16.02.2006 --- Show
Trojan.MulDrop.2924 16.02.2006 --- Show
Trojan.DownLoader.5949 16.02.2006 --- Show
Trojan.DownLoader.4844 16.02.2006 --- Show
Trojan.DownLoader.4371 16.02.2006 --- Show
Trojan.DownLoader.4540 16.02.2006 --- Show
Trojan.DownLoader.4602 16.02.2006 --- Show
Trojan.DownLoader.4586 16.02.2006 --- Show
Adware.Missjo 16.02.2006 --- Show
Adware.Ksda 16.02.2006 --- Show
Adware.Eztracks 16.02.2006 --- Show
Adware.Emusic 16.02.2006 --- Show
Trojan.DownLoader.6000 16.02.2006 --- Show
Tool.CSHelper 16.02.2006 --- Show
Adware.CoolSavings 16.02.2006 --- Show
Adware.Urlser 16.02.2006 --- Show
Trojan.MulDrop.2057 16.02.2006 --- Show
Trojan.DownLoader.4710 16.02.2006 --- Show
Adware.AdultIt 16.02.2006 --- Show
Trojan.DownLoader.5646 16.02.2006 --- Show
Trojan.DownLoader.5217 16.02.2006 --- Show
Adware.Accelerator 16.02.2006 --- Show
Adware.Solutions 16.02.2006 --- Show
IRC.Rated 16.02.2006 --- Show
IRC.Pif 16.02.2006 --- Show
VBS.Nyar 16.02.2006 --- Show
Trojan.KillFiles.311 16.02.2006 --- Show
Trojan.Apulia.320 16.02.2006 --- Show
FDOS.Deepfreeze 16.02.2006 --- Show
Flooder.Akuma 16.02.2006 --- Show
Tool.Cleanlog 16.02.2006 --- Show
Tool.FXscanner 16.02.2006 --- Show
BackDoor.Generic.1229 16.02.2006 --- Show
Trojan.Radhach 16.02.2006 --- Show
FDOS.Yimhell 16.02.2006 --- Show
Exploit.DCom.37 16.02.2006 --- Show
Exploit.DCom.52 16.02.2006 --- Show
Exploit.Oracle 16.02.2006 --- Show
Exploit.Netdde 16.02.2006 --- Show
Exploit.MS05-39 16.02.2006 --- Show
Exploit.Kick 16.02.2006 --- Show
Exploit.CAN2003.3 16.02.2006 --- Show
Exploit.RemoteThread 16.02.2006 --- Show

1 2 3 4 5 ... 76583 76584 76585 76586 76587 76588

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.