Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Vecna.Add-on.3792 16.02.2006 --- Show
Win32.Tamiami 16.02.2006 --- Show
Exploit.MS05-037 16.02.2006 --- Show
VBS.Generic.263 16.02.2006 --- Show
Trojan.PWS.LDPinch.520 16.02.2006 --- Show
VBS.Generic.258 16.02.2006 --- Show
Win32.HLLM.BadNet 16.02.2006 --- Show
Win32.HLLC.Hide.23552 16.02.2006 --- Show
Trojan.MulDrop.2647 16.02.2006 --- Show
Trojan.MulDrop.2610 16.02.2006 --- Show
Trojan.Hooker.46 16.02.2006 --- Show
Trojan.MulDrop.3174 16.02.2006 --- Show
Trojan.Digos 16.02.2006 --- Show
Trojan.DownLoader.2754 16.02.2006 --- Show
BackDoor.Purart 16.02.2006 --- Show
Trojan.NtRootKit.78 16.02.2006 --- Show
Trojan.PWS.Bancos.216 16.02.2006 --- Show
Trojan.AVKill.141 16.02.2006 --- Show
Trojan.NtRootKit.55 16.02.2006 --- Show
BackDoor.Pix 16.02.2006 --- Show
Trojan.NtRootKit.44 16.02.2006 --- Show
Trojan.DownLoader.5354 16.02.2006 --- Show
Trojan.Click.839 16.02.2006 --- Show
BackDoor.Generic.1211 16.02.2006 --- Show
Trojan.KillFiles.482 16.02.2006 --- Show
BackDoor.Before 16.02.2006 --- Show
Trojan.Foova 16.02.2006 --- Show
Trojan.DownLoader.5242 16.02.2006 --- Show
BackDoor.Protg.105 16.02.2006 --- Show
Trojan.Hooker.31 16.02.2006 --- Show
Win32.HLLC.Belset 16.02.2006 --- Show
Trojan.DownLoader.6174 16.02.2006 --- Show
Trojan.Click.838 16.02.2006 --- Show
Trojan.DownLoader.6109 16.02.2006 --- Show
Trojan.DownLoader.5734 16.02.2006 --- Show
Trojan.Click.697 16.02.2006 --- Show
Trojan.Ports 16.02.2006 --- Show
Trojan.DownLoader.6263 16.02.2006 --- Show
Trojan.Misma 16.02.2006 --- Show
Trojan.DownLoader.6032 16.02.2006 --- Show
BackDoor.ProRat.43 16.02.2006 --- Show
BackDoor.Bobi.20 16.02.2006 --- Show
Trojan.MulDrop.3137 16.02.2006 --- Show
Trojan.KillFiles.472 16.02.2006 --- Show
Win32.HLLW.Sstar 16.02.2006 --- Show
Trojan.KillFiles.474 16.02.2006 --- Show
Trojan.AVKill.129 16.02.2006 --- Show
Trojan.StartPage.1166 16.02.2006 --- Show
Trojan.DownLoader.5078 16.02.2006 --- Show
Trojan.Howiper 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.