Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader.3766 17.02.2006 --- Show
Trojan.MulDrop.2560 17.02.2006 --- Show
Trojan.PWS.Banker.361 17.02.2006 --- Show
Trojan.DownLoader.402 17.02.2006 --- Show
Trojan.Proxy.106 17.02.2006 --- Show
Trojan.LowZones.105 17.02.2006 --- Show
Trojan.LowZones.104 17.02.2006 --- Show
Trojan.DownLoader.2918 17.02.2006 --- Show
Trojan.DownLoader.2917 17.02.2006 --- Show
Trojan.Proxy.189 17.02.2006 --- Show
Trojan.DownLoader.468 17.02.2006 --- Show
Trojan.DownLoader.2959 17.02.2006 --- Show
BackDoor.IRC.Lub 17.02.2006 --- Show
Trojan.DownLoader.3496 17.02.2006 --- Show
Trojan.DownLoader.3879 17.02.2006 --- Show
Trojan.MulDrop.2159 17.02.2006 --- Show
Trojan.Proxy.425 17.02.2006 --- Show
Trojan.Mzu 17.02.2006 --- Show
Trojan.DownLoader.3320 17.02.2006 --- Show
Trojan.DownLoader.3748 17.02.2006 --- Show
Trojan.PWS.Banker.866 17.02.2006 --- Show
Trojan.DownLoader.3739 17.02.2006 --- Show
BackDoor.Generic.1064 17.02.2006 --- Show
Dialer.Petro 17.02.2006 --- Show
BackDoor.Wush 17.02.2006 --- Show
Trojan.MulDrop.2515 17.02.2006 --- Show
Trojan.DownLoader.3493 17.02.2006 --- Show
Trojan.PWS.Banker.915 17.02.2006 --- Show
Trojan.DownLoader.3623 17.02.2006 --- Show
BackDoor.Paraq 17.02.2006 --- Show
Trojan.DownLoader.6562 17.02.2006 --- Show
Trojan.DownLoader.5202 17.02.2006 --- Show
Trojan.MulDrop.2403 17.02.2006 --- Show
BackDoor.Gotry 17.02.2006 --- Show
BackDoor.Pigeon.19 17.02.2006 --- Show
Trojan.xRage 17.02.2006 --- Show
Trojan.DownLoader.3737 17.02.2006 --- Show
Trojan.DownLoader.3736 17.02.2006 --- Show
Trojan.PWS.CoolAngel 17.02.2006 --- Show
Trojan.DownLoader.3446 17.02.2006 --- Show
Trojan.MulDrop.884 17.02.2006 --- Show
Trojan.DownLoader.2197 17.02.2006 --- Show
Trojan.DownLoader.3491 17.02.2006 --- Show
Trojan.DownLoader.3617 17.02.2006 --- Show
Trojan.DownLoader.3939 17.02.2006 --- Show
Trojan.DownLoader.4029 17.02.2006 --- Show
Trojan.DownLoader.4028 17.02.2006 --- Show
Trojan.Click.46 17.02.2006 --- Show
Adware.TopConvert 17.02.2006 --- Show
Trojan.Proxy.215 17.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.