Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.StartPage.876 16.02.2006 --- Show
Trojan.StartPage.923 16.02.2006 --- Show
Trojan.PWS.Gsearch 16.02.2006 --- Show
Trojan.KillFiles.452 16.02.2006 --- Show
Trojan.Cerita 16.02.2006 --- Show
BackDoor.MiniBack.11 16.02.2006 --- Show
Trojan.Click.759 16.02.2006 --- Show
Trojan.DownLoader.4938 16.02.2006 --- Show
BackDoor.Generic.1213 16.02.2006 --- Show
Trojan.KillFiles.453 16.02.2006 --- Show
Trojan.DownLoader.4415 16.02.2006 --- Show
Trojan.KillFiles.445 16.02.2006 --- Show
Trojan.Virico 16.02.2006 --- Show
Trojan.DownLoader.4243 16.02.2006 --- Show
Exploit.IframeBO 16.02.2006 --- Show
Exploit.CAN2005-1790 16.02.2006 --- Show
Exploit.IewinBO 16.02.2006 --- Show
Evul.dropper 16.02.2006 --- Show
Trojan.DownLoader.6916 16.02.2006 --- Show
Win32.HLLM.Beagle.19829 16.02.2006 --- Show
Trojan.DownLoader.6923 16.02.2006 --- Show
Trojan.DownLoader.6922 16.02.2006 --- Show
BackDoor.Khalobot 16.02.2006 --- Show
Trojan.DownLoader.6920 16.02.2006 --- Show
Trojan.DownLoader.6918 16.02.2006 --- Show
Trojan.DownLoader.6919 16.02.2006 --- Show
Trojan.DownLoader.6921 16.02.2006 --- Show
Trojan.MulDrop.1163 16.02.2006 --- Show
Trojan.MulDrop.1408 16.02.2006 --- Show
Trojan.MulDrop.1554 16.02.2006 --- Show
BackDoor.IRC.Sdbot.465 16.02.2006 --- Show
BackDoor.Haxdoor.206 16.02.2006 --- Show
Win32.HLLM.Beagle.27136 16.02.2006 --- Show
Adware.MediaInject 16.02.2006 --- Show
Trojan.MulDrop.3298 16.02.2006 --- Show
Trojan.DownLoader.6912 16.02.2006 --- Show
Trojan.MulDrop.918 16.02.2006 --- Show
Trojan.DownLoader.6914 16.02.2006 --- Show
Trojan.DownLoader.6913 16.02.2006 --- Show
Trojan.MulDrop.1141 16.02.2006 --- Show
Win32.HLLW.Satbot 16.02.2006 --- Show
Trojan.MulDrop.3168 16.02.2006 --- Show
Trojan.KeyLogger.402 16.02.2006 --- Show
Trojan.MulDrop.2928 16.02.2006 --- Show
Trojan.DownLoader.6910 16.02.2006 --- Show
Trojan.MulDrop.3005 16.02.2006 --- Show
Trojan.MulDrop.3007 16.02.2006 --- Show
Trojan.PWS.Banker.1515 16.02.2006 --- Show
Trojan.PWS.LDPinch.751 16.02.2006 --- Show
Trojan.PWS.Jiao 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.