Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.MulDrop.2535 16.02.2006 --- Show
Trojan.DownLoader.3088 16.02.2006 --- Show
Trojan.MulDrop.2350 16.02.2006 --- Show
Trojan.DownLoader.3181 16.02.2006 --- Show
Trojan.Terrax 16.02.2006 --- Show
Trojan.MulDrop.2557 16.02.2006 --- Show
DDoS.Seti 16.02.2006 --- Show
Trojan.MulDrop.2482 16.02.2006 --- Show
Trojan.DownLoader.3293 16.02.2006 --- Show
Trojan.DownLoader.3295 16.02.2006 --- Show
Trojan.DownLoader.3269 16.02.2006 --- Show
Trojan.MulDrop.2346 16.02.2006 --- Show
Trojan.DownLoader.3115 16.02.2006 --- Show
BackDoor.IRC.Toteke 16.02.2006 --- Show
BackDoor.IRC.Morda 16.02.2006 --- Show
BackDoor.Alozo 16.02.2006 --- Show
Trojan.MulDrop.2576 16.02.2006 --- Show
Trojan.DownLoader.3247 16.02.2006 --- Show
Trojan.DownLoader.3140 16.02.2006 --- Show
Trojan.DownLoader.3142 16.02.2006 --- Show
BackDoor.Loved 16.02.2006 --- Show
BackDoor.Lightning 16.02.2006 --- Show
Trojan.Chamiko 16.02.2006 --- Show
Trojan.Xssd 16.02.2006 --- Show
Trojan.DownLoader.3297 16.02.2006 --- Show
Trojan.Frest 16.02.2006 --- Show
Trojan.MulDrop.2294 16.02.2006 --- Show
Trojan.Click.357 16.02.2006 --- Show
Trojan.Click.602 16.02.2006 --- Show
Trojan.DownLoader.3288 16.02.2006 --- Show
Trojan.DownLoader.2696 16.02.2006 --- Show
Trojan.DownLoader.4825 16.02.2006 --- Show
Trojan.DownLoader.3304 16.02.2006 --- Show
Trojan.Click.601 16.02.2006 --- Show
Trojan.Click.781 16.02.2006 --- Show
Trojan.DownLoader.3302 16.02.2006 --- Show
Trojan.DownLoader.2785 16.02.2006 --- Show
Trojan.Siquid 16.02.2006 --- Show
Trojan.Bluflame 16.02.2006 --- Show
Trojan.MulDrop.2288 16.02.2006 --- Show
Trojan.DownLoader.3374 16.02.2006 --- Show
Trojan.DownLoader.3002 16.02.2006 --- Show
Trojan.DownLoader.2788 16.02.2006 --- Show
Trojan.DownLoader.2449 16.02.2006 --- Show
Win32.HLLW.Claves 16.02.2006 --- Show
Trojan.MulDrop.2269 16.02.2006 --- Show
Exploit.Messenger 16.02.2006 --- Show
Trojan.StartPage.776 16.02.2006 --- Show
Trojan.DownLoader.2957 16.02.2006 --- Show
Adware.AzeSearch 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.