Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.3025 16.02.2006 --- Show
Trojan.DownLoader.6507 16.02.2006 --- Show
Trojan.DownLoader.6353 16.02.2006 --- Show
Exploit.Injscript 16.02.2006 --- Show
Trojan.DownLoader.6348 16.02.2006 --- Show
VirusConstructor.Pterror 16.02.2006 --- Show
Trojan.DownLoader.6397 16.02.2006 --- Show
VBS.Generic.419 16.02.2006 --- Show
Trojan.DownLoader.6271 16.02.2006 --- Show
Trojan.PWS.LDPinch.679 16.02.2006 --- Show
BackDoor.Bifrost.35 16.02.2006 --- Show
Adware.Chameleon 16.02.2006 --- Show
Trojan.Proxy.643 16.02.2006 --- Show
BAT.Crater.1746 16.02.2006 --- Show
Trojan.DownLoader.6391 16.02.2006 --- Show
BackDoor.IRC.Sdbot.442 16.02.2006 --- Show
SunOS.BoxPoison.289 16.02.2006 --- Show
BackDoor.Dau 16.02.2006 --- Show
Trojan.DownLoader.6355 16.02.2006 --- Show
WinReg.Zox.55 16.02.2006 --- Show
Trojan.MulDrop.3213 16.02.2006 --- Show
Win32.Promises.2756 16.02.2006 --- Show
Win32.Vampiro.2883 16.02.2006 --- Show
Trojan.PWS.LDPinch.728 16.02.2006 --- Show
Trojan.DownLoader.6759 16.02.2006 --- Show
Win32.NGVCK.7162 16.02.2006 --- Show
Win32.Mort.1820 16.02.2006 --- Show
Win32.Lom 16.02.2006 --- Show
Win32.HLLP.Labox 16.02.2006 --- Show
Win32.Henky.1200 16.02.2006 --- Show
Trojan.DownLoader.1525 16.02.2006 --- Show
Win32.Bayan.7470 16.02.2006 --- Show
Winp16.5354 16.02.2006 --- Show
BAT.Yova 16.02.2006 --- Show
VBS.LadyBlue 16.02.2006 --- Show
VBS.Ren 16.02.2006 --- Show
VBS.Generic.456 16.02.2006 --- Show
VBS.Generic.307 16.02.2006 --- Show
VBS.Hatred 16.02.2006 --- Show
Unix.Vtmp 16.02.2006 --- Show
Unix.Owr.65 16.02.2006 --- Show
Unix.Kraken 16.02.2006 --- Show
MBA.First.7512 16.02.2006 --- Show
PHP.Pirus 16.02.2006 --- Show
PHP.NewWorld 16.02.2006 --- Show
WM.Blur 16.02.2006 --- Show
W97M.Tuna 16.02.2006 --- Show
O97M.Suite 16.02.2006 --- Show
O97M.Vovan 16.02.2006 --- Show
A97M.Umba 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.