Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
HLLC.5728 16.02.2006 --- Show
HLLP.5712 16.02.2006 --- Show
HLLP.5701 16.02.2006 --- Show
HLLW.5696 16.02.2006 --- Show
HLLC.Tab.5696 16.02.2006 --- Show
Trojan.InstKill.7104 16.02.2006 --- Show
HLLP.Helloween.5653 16.02.2006 --- Show
HLLP.5619 16.02.2006 --- Show
HLLP.Scuns.5616 16.02.2006 --- Show
HLLP.MadMan.5612 16.02.2006 --- Show
HLLP.5568 16.02.2006 --- Show
HLLP.Krile.5549 16.02.2006 --- Show
HLLP.Regular 16.02.2006 --- Show
HLLP.Insect.5540 16.02.2006 --- Show
HLLP.5536 16.02.2006 --- Show
HLLP.5515 16.02.2006 --- Show
HLLO.Maratik.5488 16.02.2006 --- Show
HLLP.5444 16.02.2006 --- Show
HLLP.Maxim.5445 16.02.2006 --- Show
HLLP.Irka.5400 16.02.2006 --- Show
HLLP.Kasf 16.02.2006 --- Show
IRC.Ds.5392 16.02.2006 --- Show
HLLP.Carol.5381 16.02.2006 --- Show
HLLC.5376 16.02.2006 --- Show
HLLP.DarkFox.5299 16.02.2006 --- Show
HLLW.Cespol.5296 16.02.2006 --- Show
HLLP.Regular.5296 16.02.2006 --- Show
HLLP.5280 16.02.2006 --- Show
HLLC.Tavc.5228 16.02.2006 --- Show
HLLP.Tavc.5233 16.02.2006 --- Show
HLLP.5220 16.02.2006 --- Show
HLLW.Shmon.5185 16.02.2006 --- Show
HLLP.5175 16.02.2006 --- Show
HLLO.5151 16.02.2006 --- Show
HLLP.5074 16.02.2006 --- Show
HLLP.5057 16.02.2006 --- Show
HLLP.5008 16.02.2006 --- Show
HLLP.Hooter.5000 16.02.2006 --- Show
HLLP.4997 16.02.2006 --- Show
HLLP.Savage.4987 16.02.2006 --- Show
HLLP.Bdaagwa 16.02.2006 --- Show
HLLC.4968 16.02.2006 --- Show
HLLP.4949 16.02.2006 --- Show
HLLP.7940 16.02.2006 --- Show
HLLP.Brian.4933 16.02.2006 --- Show
HLLP.UH.4926 16.02.2006 --- Show
HLLP.Ache.4921 16.02.2006 --- Show
HLLP.Carol.4885 16.02.2006 --- Show
HLLP.Taras.4884 16.02.2006 --- Show
HLLO.4880 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.