Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PWS.Cedp 17.02.2006 --- Show
Trojan.ProAgent.20 17.02.2006 --- Show
Trojan.Proxy.221 17.02.2006 --- Show
Trojan.Click.48 17.02.2006 --- Show
Trojan.Click.678 17.02.2006 --- Show
Trojan.Click.629 17.02.2006 --- Show
Trojan.PWS.Ahne 17.02.2006 --- Show
Trojan.DownLoader.1315 17.02.2006 --- Show
Trojan.DownLoader.580 17.02.2006 --- Show
Trojan.DownLoader.2722 17.02.2006 --- Show
Trojan.DownLoader.2887 17.02.2006 --- Show
Trojan.DownLoader.3536 17.02.2006 --- Show
BackDoor.Microkosmus 17.02.2006 --- Show
Trojan.Click.644 17.02.2006 --- Show
Trojan.Click.643 17.02.2006 --- Show
Trojan.Click.378 17.02.2006 --- Show
Trojan.SMW 17.02.2006 --- Show
Trojan.PWS.Arj 17.02.2006 --- Show
Trojan.Click.389 17.02.2006 --- Show
Trojan.DownLoader.2523 17.02.2006 --- Show
Trojan.Click.676 17.02.2006 --- Show
Trojan.PWS.Lemon 17.02.2006 --- Show
Trojan.Click.677 17.02.2006 --- Show
Trojan.DownLoader.1947 17.02.2006 --- Show
Trojan.StartPage.704 17.02.2006 --- Show
Trojan.KeyLogger.145 17.02.2006 --- Show
Trojan.PWS.Banker.654 17.02.2006 --- Show
Trojan.StartPage.541 17.02.2006 --- Show
Trojan.Click.358 17.02.2006 --- Show
Trojan.DownLoader.4524 17.02.2006 --- Show
Trojan.DownLoader.3786 17.02.2006 --- Show
Trojan.DownLoader.2561 17.02.2006 --- Show
Trojan.Secagent 17.02.2006 --- Show
Trojan.DownLoader.3153 17.02.2006 --- Show
Trojan.DownLoader.3243 17.02.2006 --- Show
BackDoor.Dfkmd 17.02.2006 --- Show
Trojan.NtRootKit.47 17.02.2006 --- Show
Trojan.Easy.10 17.02.2006 --- Show
Exploit.JpegDeath 17.02.2006 --- Show
Exploit.MS04-028 17.02.2006 --- Show
Trojan.DownLoader.3835 17.02.2006 --- Show
Trojan.MulDrop.2455 17.02.2006 --- Show
Trojan.Spyw 17.02.2006 --- Show
Trojan.KeyLogger.164 17.02.2006 --- Show
Trojan.DownLoader.3783 17.02.2006 --- Show
Trojan.DownLoader.5252 17.02.2006 --- Show
Trojan.DownLoader.4520 17.02.2006 --- Show
Trojan.PWS.Banker.993 17.02.2006 --- Show
Trojan.DownLoader.3727 17.02.2006 --- Show
Trojan.DownLoader.3701 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.