Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
HLLP.7643 16.02.2006 --- Show
HLLP.Mrweb.6728 16.02.2006 --- Show
HLLP.6688 16.02.2006 --- Show
HLLC.Sounds 16.02.2006 --- Show
HLLP.6590 16.02.2006 --- Show
HLLP.Zaporozh.6576 16.02.2006 --- Show
HLLP.6565 16.02.2006 --- Show
HLLP.Nazi.6528 16.02.2006 --- Show
HLLO.6526 16.02.2006 --- Show
HLLO.6508 16.02.2006 --- Show
HLLP.Infector.6496 16.02.2006 --- Show
HLLC.Energy.6494 16.02.2006 --- Show
HLLP.Harmless.6480 16.02.2006 --- Show
HLLP.6480 16.02.2006 --- Show
HLLP.6420 16.02.2006 --- Show
HLLP.Enigma.6406 16.02.2006 --- Show
HLLO.6400 16.02.2006 --- Show
Trojan.HellBell.6384 16.02.2006 --- Show
HLLO.Zero.6368 16.02.2006 --- Show
HLLP.Saw 16.02.2006 --- Show
HLLP.6256 16.02.2006 --- Show
HLLP.Kornik.6256 16.02.2006 --- Show
Trojan.DelSys.6240 16.02.2006 --- Show
HLLO.6240 16.02.2006 --- Show
HLLP.Ilse.7616 16.02.2006 --- Show
HLLP.Nover.6176 16.02.2006 --- Show
HLLO.Dya.6144 16.02.2006 --- Show
HLLP.Maratik.6128 16.02.2006 --- Show
HLLP.6128 16.02.2006 --- Show
HLLP.Shed.6089 16.02.2006 --- Show
HLLC.Deleter.6048 16.02.2006 --- Show
HLLP.Nolon.6016 16.02.2006 --- Show
HLLC.Duke.6016 16.02.2006 --- Show
HLLP.Duke.6014 16.02.2006 --- Show
HLLW.6010 16.02.2006 --- Show
HLLO.3600 16.02.2006 --- Show
HLLP.Maratik.5984 16.02.2006 --- Show
HLLP.5984 16.02.2006 --- Show
HLLP.Voodoo.5984 16.02.2006 --- Show
HLLP.KGB.5943 16.02.2006 --- Show
HLLP.Joke.5926 16.02.2006 --- Show
HLLP.Metra.5914 16.02.2006 --- Show
HLLP.5904 16.02.2006 --- Show
HLLP.5872 16.02.2006 --- Show
HLLC.5824 16.02.2006 --- Show
HLLP.Birthday.5824 16.02.2006 --- Show
HLLP.5808 16.02.2006 --- Show
HLLC.5792 16.02.2006 --- Show
HLLP.15746 16.02.2006 --- Show
HLLW.DByte.5744 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.