Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.6098 16.02.2006 --- Show
Trojan.DownLoader.5181 16.02.2006 --- Show
Trojan.DownLoader.5173 16.02.2006 --- Show
Trojan.DownLoader.5148 16.02.2006 --- Show
Trojan.DownLoader.5138 16.02.2006 --- Show
Trojan.DownLoader.4980 16.02.2006 --- Show
Trojan.DownLoader.3916 16.02.2006 --- Show
Trojan.DownLoader.3634 16.02.2006 --- Show
Trojan.DownLoader.114 16.02.2006 --- Show
Trojan.Click.716 16.02.2006 --- Show
Trojan.Click.527 16.02.2006 --- Show
Trojan.Aries 16.02.2006 --- Show
Trojan.Aequitas 16.02.2006 --- Show
TornSpy.4336 16.02.2006 --- Show
Munya.3025 16.02.2006 --- Show
IRC.Tarako 16.02.2006 --- Show
IRC.Generic.133 16.02.2006 --- Show
FDOS.Autobot 16.02.2006 --- Show
Exploit.MozillaBO 16.02.2006 --- Show
Exploit.Iobjsafe 16.02.2006 --- Show
Exploit.Formpaste 16.02.2006 --- Show
Exploit.DCom.32 16.02.2006 --- Show
Exploit.Ccerror 16.02.2006 --- Show
Adware.SiteHistory 16.02.2006 --- Show
Adware.PeerNet 16.02.2006 --- Show
Adware.Bazooka 16.02.2006 --- Show
Adware.Akpz 16.02.2006 --- Show
Dialer.Snow 16.02.2006 --- Show
BackDoor.Vidsrv 16.02.2006 --- Show
BackDoor.Trick 16.02.2006 --- Show
BackDoor.Ralpha 16.02.2006 --- Show
BackDoor.Punctes 16.02.2006 --- Show
BackDoor.Netwall 16.02.2006 --- Show
BackDoor.Mrobe 16.02.2006 --- Show
BackDoor.IRC.Rator 16.02.2006 --- Show
BackDoor.IRC.Pakauk 16.02.2006 --- Show
BackDoor.Iprip.3 16.02.2006 --- Show
BackDoor.Generic.1140 16.02.2006 --- Show
BackDoor.Generic.1102 16.02.2006 --- Show
BackDoor.ColdFusion.13 16.02.2006 --- Show
BackDoor.Cigi.18 16.02.2006 --- Show
BackDoor.Btftp 16.02.2006 --- Show
Alive.dropper.3800 16.02.2006 --- Show
Milan.289 16.02.2006 --- Show
Trojan.MulDrop.1933 16.02.2006 --- Show
Trojan.DownLoader.5171 16.02.2006 --- Show
Trojan.DownLoader.5008 16.02.2006 --- Show
BackDoor.IRC.Sdbot.69 16.02.2006 --- Show
Win32.HLLM.Bugbear 16.02.2006 27.04.2005 Show
Trojan.MulDrop.2632 16.02.2006 --- Show

1 2 3 4 5 ... 76583 76584 76585 76586 76587 76588

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.