Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
HLLC.Delme 16.02.2006 --- Show
HLLP.Pva.8064 16.02.2006 --- Show
HLLP.Duke.8064 16.02.2006 --- Show
HLLP.Firt.8016 16.02.2006 --- Show
HLLC.Ateam.8897 16.02.2006 --- Show
HLLC.Maratik.8001 16.02.2006 --- Show
HLLP.Pcone.7936 16.02.2006 --- Show
HLLP.7910 16.02.2006 --- Show
HLLP.Tet.7897 16.02.2006 --- Show
HLLP.Tet.7878 16.02.2006 --- Show
HLLP.7838 16.02.2006 --- Show
HLLP.7819 16.02.2006 --- Show
HLLP.7808 16.02.2006 --- Show
HLLP.Pva.7776 16.02.2006 --- Show
HLLP.7776 16.02.2006 --- Show
HLLP.Legado.7776 16.02.2006 --- Show
HLLP.Inst.7712 16.02.2006 --- Show
HLLP.7712 16.02.2006 --- Show
HLLP.8600 16.02.2006 --- Show
HLLP.Den.7582 16.02.2006 --- Show
HLLP.Duke.7525 16.02.2006 --- Show
HLLP.7508 16.02.2006 --- Show
HLLW.Go.7490 16.02.2006 --- Show
HLLC.7421 16.02.2006 --- Show
HLLP.Niki.7412 16.02.2006 --- Show
HLLP.Tavc 16.02.2006 --- Show
HLLP.Zielona.7300 16.02.2006 --- Show
HLLP.Dan.7285 16.02.2006 --- Show
HLLO.Anonim.7216 16.02.2006 --- Show
HLLP.7200 16.02.2006 --- Show
HLLW.Freemem.11392 16.02.2006 --- Show
HLLP.Bmbm.7136 16.02.2006 --- Show
HLLP.7424 16.02.2006 --- Show
HLLP.Arch.7136 16.02.2006 --- Show
HLLW.7125 16.02.2006 --- Show
HLLP.Dekas 16.02.2006 --- Show
HLLP.7102 16.02.2006 --- Show
HLLP.7126 16.02.2006 --- Show
HLLC.Smoller 16.02.2006 --- Show
HLLP.Jsme.7020 16.02.2006 --- Show
HLLP.Buka.6998 16.02.2006 --- Show
HLLP.Shed.6978 16.02.2006 --- Show
HLLP.Buka.6978 16.02.2006 --- Show
HLLP.Uhmm.6917 16.02.2006 --- Show
HLLO.Zero.6880 16.02.2006 --- Show
HLLP.BlackStar.6880 16.02.2006 --- Show
HLLP.Diman.6880 16.02.2006 --- Show
HLLP.6880 16.02.2006 --- Show
HLLP.Birys.6773 16.02.2006 --- Show
HLLP.6768 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.