Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BAT.Werke.1298 16.02.2006 --- Show
BAT.NewHost.824 16.02.2006 --- Show
BAT.Iwashere.108 16.02.2006 --- Show
BAT.Generic.157 16.02.2006 --- Show
BAT.Limit 16.02.2006 --- Show
BAT.Generic.138 16.02.2006 --- Show
Trojan.DownLoader.6727 16.02.2006 --- Show
BAT.Generic.117 16.02.2006 --- Show
BAT.Froggy.508 16.02.2006 --- Show
BAT.Evangelia 16.02.2006 --- Show
BAT.Generic.131 16.02.2006 --- Show
BAT.Ctty 16.02.2006 --- Show
BAT.Generic.91 16.02.2006 --- Show
BAT.Junior.2233 16.02.2006 --- Show
BAT.Generic.124 16.02.2006 --- Show
AutoLisp.Pobresito 16.02.2006 --- Show
1C.Gonat 16.02.2006 --- Show
Web.Generator 16.02.2006 --- Show
B2T.Generator 16.02.2006 --- Show
Trojan.Thus 16.02.2006 --- Show
Trojan.Winreg 16.02.2006 --- Show
Trojan.StartPage.311 16.02.2006 --- Show
Trojan.StartPage.252 16.02.2006 --- Show
Trojan.StartPage.251 16.02.2006 --- Show
Trojan.StartPage.250 16.02.2006 --- Show
Trojan.Seeker.84 16.02.2006 --- Show
Trojan.Seeker.62 16.02.2006 --- Show
Trojan.Seeker.61 16.02.2006 --- Show
Trojan.Seeker.50 16.02.2006 --- Show
Trojan.Seeker.153 16.02.2006 --- Show
Trojan.RegSeeker 16.02.2006 --- Show
Trojan.Qhost.11775 16.02.2006 --- Show
Trojan.MulDrop.2682 16.02.2006 --- Show
Trojan.Slayer.20480 16.02.2006 --- Show
Trojan.Zhaol 16.02.2006 --- Show
Trojan.Tooner.236 16.02.2006 --- Show
Trojan.MulDrop.2099 16.02.2006 --- Show
Trojan.StartPage.1157 16.02.2006 --- Show
Trojan.MulDrop.1668 16.02.2006 --- Show
Trojan.StartPage.1179 16.02.2006 --- Show
Trojan.StartPage.1096 16.02.2006 --- Show
Trojan.StartPage.1078 16.02.2006 --- Show
Trojan.Grimoire 16.02.2006 --- Show
Trojan.StartPage.1082 16.02.2006 --- Show
Trojan.StartPage.126 16.02.2006 --- Show
Trojan.Deespam 16.02.2006 --- Show
Trojan.Click.745 16.02.2006 --- Show
Trojan.Hooker.48 16.02.2006 --- Show
Trojan.Director 16.02.2006 --- Show
Trojan.DownLoader.1719 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.