Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
BackDoor.Haxdoor.179 16.02.2006 --- Show
Trojan.DownLoader.4227 16.02.2006 --- Show
Trojan.Bibi 16.02.2006 --- Show
Trojan.MulDrop.3034 16.02.2006 --- Show
Trojan.Bannerc 16.02.2006 --- Show
Trojan.KillFiles.468 16.02.2006 --- Show
BackDoor.Generic.1201 16.02.2006 --- Show
Trojan.Inject.46 16.02.2006 --- Show
Trojan.KillFiles.467 16.02.2006 --- Show
Trojan.Oneof 16.02.2006 --- Show
Adware.BestPhrases 16.02.2006 --- Show
Trojan.Corder 16.02.2006 --- Show
Trojan.Fall 16.02.2006 --- Show
Trojan.DownLoader.5881 16.02.2006 --- Show
Trojan.AVKill.133 16.02.2006 --- Show
Trojan.Click.767 16.02.2006 --- Show
Trojan.Proxy.587 16.02.2006 --- Show
Trojan.KillFiles.470 16.02.2006 --- Show
Trojan.DownLoader.5586 16.02.2006 --- Show
Trojan.Casper 16.02.2006 --- Show
Trojan.Neron 16.02.2006 --- Show
Trojan.AVKill.136 16.02.2006 --- Show
Win32.HLLC.Lingak 16.02.2006 --- Show
Trojan.Ntupd 16.02.2006 --- Show
Trojan.Wprot 16.02.2006 --- Show
Win32.HLLW.Dumhe 16.02.2006 --- Show
Trojan.PWS.Legmir.430 16.02.2006 --- Show
Trojan.LowZones.137 16.02.2006 --- Show
BackDoor.AFX 16.02.2006 --- Show
Trojan.PWS.Legmir.435 16.02.2006 --- Show
Trojan.AVKill.131 16.02.2006 --- Show
Adware.Erase 16.02.2006 --- Show
Win32.HLLW.SpyBot.28 16.02.2006 --- Show
Trojan.LowZones.136 16.02.2006 --- Show
BackDoor.IRC.Modirc 16.02.2006 --- Show
Trojan.PWS.Chunked 16.02.2006 --- Show
Trojan.Ivt 16.02.2006 --- Show
Trojan.Hexin 16.02.2006 --- Show
Trojan.MulDrop.2877 16.02.2006 --- Show
Trojan.DownLoader.4218 16.02.2006 --- Show
Trojan.LowZones.102 16.02.2006 --- Show
Trojan.Yrut 16.02.2006 --- Show
Trojan.Click.739 16.02.2006 --- Show
Trojan.DownLoader.5102 16.02.2006 --- Show
Trojan.Daddy 16.02.2006 --- Show
Trojan.Click.723 16.02.2006 --- Show
Trojan.SysHelp 16.02.2006 --- Show
Trojan.Overnight 16.02.2006 --- Show
Trojan.LowZones.139 16.02.2006 --- Show
Trojan.DownLoader.3910 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.