Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
HLLP.14954 16.02.2006 --- Show
HLLP.1492 16.02.2006 --- Show
HLLO.14610 16.02.2006 --- Show
Trojan.Kostya 16.02.2006 --- Show
HLLP.Vict.14366 16.02.2006 --- Show
HLLC.14000 16.02.2006 --- Show
HLLP.PMP 16.02.2006 --- Show
HLLC.13760 16.02.2006 --- Show
CMOSDead.5154 16.02.2006 --- Show
HLLC.Jomry.12896 16.02.2006 --- Show
HLLC.12368 16.02.2006 --- Show
HLLP.12064 16.02.2006 --- Show
HLLP.CRS.12048 16.02.2006 --- Show
HLLP.TMS.11712 16.02.2006 --- Show
HLLP.Zeku.11712 16.02.2006 --- Show
HLLC.Lodz.11664 16.02.2006 --- Show
HLLP.11553 16.02.2006 --- Show
HLLO.11488 16.02.2006 --- Show
HLLP.Simbirsk.11472 16.02.2006 --- Show
HLLC.11136 16.02.2006 --- Show
HLLP.Kyzyl.11096 16.02.2006 --- Show
HLLW.Freemem.11052 16.02.2006 --- Show
HLLP.10776 16.02.2006 --- Show
HLLP.10594 16.02.2006 --- Show
HLLC.Pet.10592 16.02.2006 --- Show
HLLP.10304 16.02.2006 --- Show
HLLP.Gravando.10272 16.02.2006 --- Show
HLLP.Infector.10000 16.02.2006 --- Show
HLLP.10000 16.02.2006 --- Show
HLLP.Hello.10000 16.02.2006 --- Show
HLLC.Bug.10000 16.02.2006 --- Show
HLLO.Tyst.3424 16.02.2006 --- Show
HLLO.Membrain.60960 16.02.2006 --- Show
HLLO.Joker.11000 16.02.2006 --- Show
HLLO.CVirus.4601 16.02.2006 --- Show
HLLO.3068 16.02.2006 --- Show
HLLO.12416 16.02.2006 --- Show
HLLO.12160 16.02.2006 --- Show
HLLC.Dikshew.18287 16.02.2006 --- Show
UltraViolent.5700 16.02.2006 --- Show
HLLO.Vm 16.02.2006 --- Show
HLLO.Wonder 16.02.2006 --- Show
HLLO.10842 16.02.2006 --- Show
HLLO.Nman.6286 16.02.2006 --- Show
HLLO.8214 16.02.2006 --- Show
HLLO.Nman.4830 16.02.2006 --- Show
HLLO.CVirus.4317 16.02.2006 --- Show
HLLO.CVirus.4096 16.02.2006 --- Show
HLLO.4317 16.02.2006 --- Show
HLLO.3816 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.